added
stringdate 2025-04-01 04:05:38
2025-04-01 07:14:06
| created
timestamp[us]date 2001-10-09 16:19:16
2025-01-01 03:51:31
| id
stringlengths 4
10
| metadata
dict | source
stringclasses 2
values | text
stringlengths 0
1.61M
|
|---|---|---|---|---|---|
2025-04-01T06:37:17.643336
| 2024-09-25T05:56:29
|
2547007209
|
{
"authors": [
"NadyaNayme"
],
"license": "BSD-3-Clause",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2010",
"repo": "NadyaNayme/job-gauges",
"url": "https://github.com/NadyaNayme/job-gauges/issues/64"
}
|
gharchive/issue
|
Font size should probably scale with UI Scale
It might not make sense to scale the font 1:1 with scale as 300% scale would be a massive size 42 but perhaps at 50-75% of scale? The text is comically small at scales >200% and comically large for scales <80% that it completely obscures the image/icon behind the text.
I believe Alt1 requires a whole number so maybe something like replacing the hardcoded 14 with Math.floor(14 * (scaleFactor * .6))
75% of scaleFactor seems like an appropriate amount across all ranges using ceil() instead of floor() particularly so that the font is 1px larger for scale ranging between 50-100% where 1px is a lot more drastic of a difference than at 100%+ scale where 1px difference isn't as noticeable.
Math.ceil(14 * (gaugeData.scaleFactor * 0.75))
|
2025-04-01T06:37:17.659651
| 2024-08-31T20:27:43
|
2499036260
|
{
"authors": [
"LeviSnoot",
"Namo2",
"alvitali",
"loof2736"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2012",
"repo": "Namo2/InPlayerEpisodePreview",
"url": "https://github.com/Namo2/InPlayerEpisodePreview/issues/27"
}
|
gharchive/issue
|
[bug] Breaks server discovery
Started to get reports that people can't reach my Jellyfin instance and after some investigating it looks like this server causes the web client to lose track of where the server is.
When users go to the domain for the instance they are greeted with
No servers have been found using the automatic server discovery
[Add server]
Users can click the button and type the same base URL as they're visiting in to access the server again but this isn't intuitive or intended behavior. After digging around in my Nginx config and getting nowhere I tried disabling the last plugin I installed (this one) and everything instantly went back to normal.
Hey, thanks for reporting this issue.
Could you tell me on which clients this error appeared on? (Firefox, Chrome, Windows Client, ...)
I've been getting this as well, it was happening to me on Firefox but I didn't test other browsers
Actually I'm not sure if this is an issue with 10.9.10 or with this plugin, I found the same issue in the main Jellyfin repo here: https://github.com/jellyfin/jellyfin/issues/12523
Actually I'm not sure if this is an issue with 10.9.10 or with this plugin, I found the same issue in the main Jellyfin repo here: jellyfin/jellyfin#12523
I was the one who opened jellyfin/jellyfin#12523, and can confirm the issue was caused by the plugin, not Jellyfin 10.9.10 itself. Would love to see this resolved however, as I quite like the plugin!
On a somewhat unrelated note - are there any plans to integrate the plugin into Jellyfin itself? As the functionality you provide is great :)
@Namo2 I encountered this issue on all browsers I tested (Firefox & Edge on both Windows and macOS, Safari & Chrome on macOS). There is some more information including browser console logs provided by another user in the issue mentioned above
That this error occurs on 10.9.10 is great information. I will try to fix it this weekend.
Since the JMP version is not needed anymore I canceled my plans to integrate it to jellyfin but who knows what the future will bring. The possibility is still there of course but my focus will be on the bugs which are currently still open
Since the JMP version is not needed anymore I canceled my plans to integrate it to jellyfin but who knows what the future will bring. The possibility is still there of course but my focus will be on the bugs which are currently still open
Jellyfin Media Player (desktop app?) I'd love to see it for jellyfin-web anyways - I'm expecting some of the features of the web client to be implemented in the native apps too (e.g. trickplay preview, skipping segments in the future). Sorry for the thread unrelated to this issue - thanks for giving us this plugin, in any case! <3
Since the JMP version is not needed anymore I canceled my plans to integrate it to jellyfin but who knows what the future will bring. The possibility is still there of course but my focus will be on the bugs which are currently still open
Jellyfin Media Player (desktop app?) I'd love to see it for jellyfin-web anyways - I'm expecting some of the features of the web client to be implemented in the native apps too (e.g. trickplay preview, skipping segments in the future). Sorry for the thread unrelated to this issue - thanks for giving us this plugin, in any case! <3
Hey the issue should be fixed now. Feel free to try it out and tell me if it works.
Btw fyi, the trickplay preview is in the nativ desktop client
|
2025-04-01T06:37:17.663466
| 2020-11-04T18:38:02
|
736338307
|
{
"authors": [
"Nandaka",
"jacobpewit"
],
"license": "BSD-2-Clause",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2013",
"repo": "Nandaka/PixivUtil2",
"url": "https://github.com/Nandaka/PixivUtil2/issues/859"
}
|
gharchive/issue
|
Error while trying to download from bookmarked members (/bookmark_new_illust.php)
Prerequisites
[X] Did you read FAQ section?
[X] Did you test with the latest releases or commit ?
Description
When I try to download new illusts from bookmarked members (option 8) I get the following output:
Processing New Illust from bookmark
Page #1
Source URL: https://www.pixiv.net/bookmark_new_illust.php?p=1
Error at process_new_illust_from_bookmark(): (<class 'AttributeError'>, AttributeError("'NoneType' object has no attribute 'findAll'"), <traceback object at 0x1D168800>)
Traceback (most recent call last):
File "PixivUtil2.py", line 1604, in main
np_is_valid, op_is_valid, selection = main_loop(ewd, op_is_valid, selection, np_is_valid, args)
File "PixivUtil2.py", line 1320, in main_loop
menu_download_new_illust_from_bookmark(op_is_valid, args)
File "PixivUtil2.py", line 921, in menu_download_new_illust_from_bookmark
process_new_illust_from_bookmark(page_num, end_page_num, r18)
File "PixivUtil2.py", line 419, in process_new_illust_from_bookmark
pb = PixivNewIllustBookmark(parsed_page)
File "l:\PixivUtil2Python\PixivBookmark.py", line 102, in __init__
self.__ParseNewIllustBookmark(page)
File "l:\PixivUtil2Python\PixivBookmark.py", line 120, in __ParseNewIllustBookmark
result = page.find(attrs={'class': '_image-items autopagerize_page_element'}).findAll('a')
AttributeError: 'NoneType' object has no attribute 'findAll'
press enter to exit.
Downloading by member_id and image_id seem to be working fine however.
can you upload the html page from the given url in the logging? it should try to find js-mount-point-latest-following in script tag.
Strangely, after changing my password & updating the cookie string back to the old cookie format used by pixiv, everything started working normally again.
|
2025-04-01T06:37:17.711620
| 2022-02-05T23:12:57
|
1125053077
|
{
"authors": [
"focusthenflex",
"msa2984"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2014",
"repo": "NarmathaBala/vsts-extension-retrospectives",
"url": "https://github.com/NarmathaBala/vsts-extension-retrospectives/pull/40"
}
|
gharchive/pull-request
|
[Tasks 1540, 1541] Add Snapshots and basic rendering tests
Add basic tests, snapshots for noFeedbackBoardsView, editableText, and actionItemDisplay components
Add test:watch command to allow faster test validation
Add initial testing documentation to CONTRIBUTING.MD`
@msa2984, Have no idea why, but the files I changed aren't recognizing the "mocks" file change, which is why this PR created today, instead of yesterday, so I added them directly to file. Wondering if you'd have better luck diagnosing/if you even see the issue when referencing the mocks.
➕ ➕ ➕ for updating the CONTRIBUTING doc to add testing info!
Some notes for posterity before I merge this into the bigger PR:
I swapped your tests over to Enzyme, this way we can remove the React-Test-Renderer dependency and all tests use the same framework.
I re-generated the snapshots. It seems like the snapshots using Enzyme vs React-Test-Renderer are slightly different, however from comparing them they are both correct, just a slightly different way of rendering.
I moved the shared mock calls into a setupTests.tsx file, this seems to be a much cleaner way of initializing the SDK + API mocks which are used by all of the more complex components.
I added a reference to enzyme-to-json, as this seems like the recommended serializer for snapshot testing with enzyme.
@msa2984, Have no idea why, but the files I changed aren't recognizing the "mocks" file change, which is why this PR created today, instead of yesterday, so I added them directly to file. Wondering if you'd have better luck diagnosing/if you even see the issue when referencing the mocks.
I'm wondering if you were seeing an issue similar to what I was seeing - occasionally when I would add a new mock to that folder and reference it in my test, I would get various "Could not reference X of undefined" errors. Usually restarting VS Code would resolve the issue though, so I always figured that it was just a weird file detection error. Moving the shared API + SDK mocks into the setupTests.tsx seems to have resolved the failures I was seeing with your tests when I first checked out the branch.
|
2025-04-01T06:37:17.735022
| 2024-05-23T02:40:41
|
2311817407
|
{
"authors": [
"Natanaelel",
"nitrofenix",
"trunksbomb"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2016",
"repo": "Natanaelel/TankStorage",
"url": "https://github.com/Natanaelel/TankStorage/issues/1"
}
|
gharchive/issue
|
Suggestions from Discord
Keeping these in one place:
nitrofenix: i'd base it on banks but maybe with half the amount of slots per tier
trunksbomb: 8 buckets/16/64/256/1024/1000000
Tiers/capacities from the old mod (for reference/discussion only):
1: 3 tanks of 4000 mB each
2: 6 tanks of 16000 mB each
3: 9 tanks of 64000 mB each
4: 12 tanks of 256000 mB each
5: 15 tanks of 1024000 mB each
6: 18 tanks of 4096000 mB each
7: 27 tanks of 247483647 mB each
Huh, would you look at that - I was pretty spot on for capacity :)
Additional suggestions:
Lockable slots
Automatic pickup of fluids when standing in them? Probably not a good idea
use the tank itself as the bucket (no dedicated bucket item like entangled buckets)
shift + click air to change modes, shift + scroll while in "build" mode to change which liquid you're selecting
definitely a "void" mode to void excess fluids
maybe a sponge mode, or a mode that functions like a hose pulley from Create so you can target one block of fluid and have it suck up other blocks in the same body of water
shift+click bucket of fluid in inventory while Tank GUI is open automatically inserts the fluid from that bucket, like Modern Industrialization machines
Done so far:
tank 1-7 and dock
can interact with buckets/similar in gui including shift click
can interact with pipes in world using dock
can lock slots
|
2025-04-01T06:37:17.778585
| 2020-08-27T21:37:12
|
687559003
|
{
"authors": [
"NathanaelA",
"kaustavlahiri"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2017",
"repo": "NathanaelA/nativescript-sqlite",
"url": "https://github.com/NathanaelA/nativescript-sqlite/issues/162"
}
|
gharchive/issue
|
Point to custom Sqlite3 for paid extension support
Is it possible to make nativescript-sqite use a custom bundled Sqlite3 instead of the default system one?
We have a requirement to enable database encryption from the app (by using PRAGMA key = 'pwd'). For this to work we need to use a custom sqlite3.c file that has the SEE plugin.
Initially we thought the paid nativescript-sqlite supports encryption but it turns out it can only decrypt?
This plugin supports both encryption and decryption.
You can already use PRAGMA key='...'
PRAGMA key ='somekey' to set encryption on a non encrypted database does not work. If a database is already encrypted, I could decrypt with options:key and then add a new key with PRAGMA rekey = '';
Yes, you have to create a new database with encryption (which you can do with a create database command or ship a encrypted db). You are correct it won't encrypt a un-encrypted database, however you can work around by just create a new database and copy all data from the old database and then delete the old un-encrypted version.
However, for security; if you are wanting to have encrypted db's it is better to start with a encrypted database rather than a unencrypted database.
Thanks for confirming.
What you are saying, is indeed one of my options: Ship an encrypted database with the app to begin with --> decrypt with your plugin --> rekey as needed.
I would have to explore the other approach you suggested aka create a new encrypted database and then copy over stuff from the old unencrypted one. Although, I don't want to put all this script in the app code. So most likely I won't go with this option. Still its good to know that your plugin can create a new db with encryption turned on.
Finally, just out of continued curiosity, is it possible to make use of a custom sqlite3 library in your plugin? The module.modulemap under platform/ios seems to specify the library. I was wondering if I could do something there to pick up my custom sqlite3.c?
Well, we could build you a custom version with your sqlite3.c file; it is basically just building a new aar (on android) and framework on ios to be linked in and using them as the native part. The rest of the code base (like the JS) would work with no other changes; so it is really just creating new native libraries using he SEE version of sqlite instead of SqlCipher.
Got it. Thats exactly what I was looking for. Infact, we have got around this use case by using open source SqlCipher to initially encrypt the database during the build phase and then use your paid plugin to decrypt and rekey as needed. So I am good now. Its still good to know that you can package a custom sqlite version, if needed. Thank you!
|
2025-04-01T06:37:17.846748
| 2020-08-29T17:26:04
|
688572451
|
{
"authors": [
"NathanaelA",
"rigor789"
],
"license": "Apache-2.0",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2018",
"repo": "NativeScript/android-runtime",
"url": "https://github.com/NativeScript/android-runtime/issues/1634"
}
|
gharchive/issue
|
Update getAppResourcesPath() to use the new configs
@NathanaelA we need to update these for 7.0 to read from the new config file. I think we should probably create a new CLI command that the gradle script can invoke and read the output - because the configs are no longer simple json files. As a quick fix, we could read the value with some regex (though that'd be easy to break in the configs - since it's js/ts).
The current implementation could be kept as a fallback.
https://github.com/NativeScript/android-runtime/blob/b10b6d625807f0d65dfebe2649cc37cfb124dd6e/test-app/gradle-helpers/paths.gradle#L19-L37
https://github.com/NativeScript/android-runtime/blob/f71130432d1fed102776bb8372906aadda82d3fe/test-app/app/build.gradle#L137-L157
@rigor789 - How about the CLI create the nsconfig.json file if the nsconfig.js file version of it exists; then no other tooling needs to change at this point, and it is then fully backwards compatible with older runtimes. Frequently we have people try using older runtimes to see when a issue has occurred; so breaking the CLI's compatibility should actually be fixed first...
The goal and we are 99% there is to get rid of redundant configs, package.jsons, special keys etc.
What I think we can/should do to keep older runtimes working, while not forcing an nsconfig.json on newer runtimes is to only generate the nsconfig.json when the runtime version is less than 7.0.0 and for 7 and above, we can add the new logic for reading the config value through the CLI.
|
2025-04-01T06:37:17.853799
| 2017-02-08T09:35:09
|
206141696
|
{
"authors": [
"NickIliev",
"ivanbuhov",
"xmlking"
],
"license": "Apache-2.0",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2019",
"repo": "NativeScript/ios-runtime",
"url": "https://github.com/NativeScript/ios-runtime/issues/725"
}
|
gharchive/issue
|
sample code to implement NativeScript Class in TypeScript with self delegate
From @xmlking on February 7, 2017 18:3
I am new to NativeScript, looking for sample code to implement NativeScript Class in TypeScript with self delegate?
here are more details :
http://stackoverflow.com/questions/41991160/how-to-implement-nativescript-class-in-typescript-with-self-delegate
want to simplify my code my eliminating additional delegate class by directly implementing delegate methods in the main class that supposed to have a delegate.
Thanks
Copied from original issue: NativeScript/NativeScript#3603
@xmlking As the doc says:
There should be no TypeScript constructor, because it will not be executed. Instead override one of the init methods.
You can override a base init method and place your delegate setting logic there:
public init() {
var self = this.super.init();
if (self) {
self.delegate = self;
}
return self;
}
@ivanbuhov thanks for you input.
my basic issue is I cannot inject Angular Service that extends NSObject
with following case I am getting runtime error, either with JS constructor() or init() methods :
file:///app/tns_modules/@angular/compiler/bundles/compiler.umd.js:18632:28:
JS ERROR Error: Invalid provider for the NgModule 'MicrosoftBandModule' - only instances of
Provider and Type are allowed, got: [?MicrosoftBandService?]
import {Injectable} from '@angular/core';
@Injectable()
export class MicrosoftBandService extends NSObject implements ConnectionDelegate {
public static ObjCProtocols = [ConnectionDelegate];
...
}
without extends NSObject the angular service will be registered properly. but native delegates has to always extend NSObject.
Need to research how to register angular service provider that extend NSObject
I tried following method, but this time I am getting undefined error :(
CONSOLE ERROR file:///app/tns_modules/tns-core-modules/trace/trace.js:160:30: ns-renderer:
Error in :0:0 caused by: undefined is not an object (evaluating 'this.msband.connection$.subscribe')
export const MicrosoftBandToken = new OpaqueToken('MicrosoftBandToken');
@Injectable()
export class MicrosoftBandService extends NSObject implements ConnectionDelegate {
public static ObjCProtocols = [ConnectionDelegate];
static new(): MicrosoftBandService {
let self = <MicrosoftBandService>super.new()
self.mbk = MicrosoftBand.alloc().init();
if (self) {
self.mbk.connectDelegate = self;
}
return self;
}
...
}
import { MicrosoftBandToken, MicrosoftBandService } from './src/app/services/microsoftband.service.ios';
export class MicrosoftBandModule {
static forRoot(): ModuleWithProviders {
return {
ngModule: MicrosoftBandModule,
providers: [
{provide: MicrosoftBandToken, useValue: MicrosoftBandService.new()},
]
};
}
}
import {MicrosoftBandToken, MicrosoftBandService} from '@xmlking/nativescript-ngx-microsoftband';
@Component({
selector: 'app',
templateUrl: "app.component.html"
})
export class AppComponent implements OnInit, OnDestroy {
constructor(private zone: NgZone, @Inject(MicrosoftBandToken) private msband: MicrosoftBandService) {
}
...
}
@xmlking It seems that an angular service can't derive from native object. Try not to register your MicrosoftBandService as angular service just to verify that the original problem - implementing NativeScript Class in TypeScript with self delegate is solved. Then you can create a separate class for your angular service.
|
2025-04-01T06:37:17.860326
| 2020-10-19T16:14:43
|
724770036
|
{
"authors": [
"edusperoni",
"jcarolus"
],
"license": "Apache-2.0",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2020",
"repo": "NativeScript/nativescript-angular",
"url": "https://github.com/NativeScript/nativescript-angular/pull/2279"
}
|
gharchive/pull-request
|
fix: Cannot reattach ActivatedRouteSnapshot created from a different …
…route
PR Checklist
[x] The PR title follows our guidelines: https://github.com/NativeScript/NativeScript/blob/master/CONTRIBUTING.md#commit-messages.
[x] There is an issue for the bug/feature this PR is for. To avoid wasting your time, it's best to open a suggestion issue first and wait for approval before working on it.
[x] You have signed the CLA.
[ ] All existing tests are passing: https://github.com/NativeScript/nativescript-angular/blob/master/DevelopmentWorkflow.md#running-the-tests
[ ] Tests for the changes are included.
What is the current behavior?
Navigating between sibling routes may sometimes mess with the cache due to it using the key of a parent route, instead of the complete route.
What is the new behavior?
This now uses the correct key from the farthest children of the route
PARTIALLY Fixes #1993. (this issue has 2 problems on it: 1 is the one fixed in this PR, the other is that route guard/resolvers don't work on back navigation and may break navigation for a PRO)
Please don't merge this yet, as it seems it might not fully solve the issue
@edusperoni @NathanaelA
When debugging this issue in the use case Root => A => B, then back to A it looks like all keys to store/retrieve are generated correctly (also without this fix), but the error is still thrown.
The expression that causes the error to be thrown (curr.value.routeConfig !== result.value.routeConfig in https://github.com/angular/angular/blob/3817e5f1dfeb9de26fa2ea4068a37565f435214f/packages/router/src/create_router_state.ts#L52) will actually show equal properties and values when inspecting, but are not the same object reference. This only occurs with lazy loaded modules (if changed to "regular" route configs it works).
Perhaps the solution direction for this part of the issue is to either use a "deepEqual" instead of reference equality or to somehow make sure that the routeConfig reference stays the same for lazy loaded modules.
Hope this helps, cheers.
|
2025-04-01T06:37:17.877453
| 2018-06-21T08:42:42
|
334394273
|
{
"authors": [
"abhayastudios",
"aosi87",
"aturan23",
"lini"
],
"license": "apache-2.0",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2021",
"repo": "NativeScript/nativescript-geolocation",
"url": "https://github.com/NativeScript/nativescript-geolocation/issues/139"
}
|
gharchive/issue
|
ZoneAwareError on with angular and iOS simulator
I am using the plugin in a location.provider.ts whose saveUserLocation method (see code below) is called from my "home" page. Everything works find on Android and a real iOS device, however on the iOS simulator it most of the times gives me this error below and sometimes it just gives me the expected result (the location object).
{"line":994,"column":38,"sourceURL":"file:///app/tns_modules/nativescript-angular/zone-js/dist/zone-nativescript.js","originalStack":"ZoneAwareError@file:///app/tns_modules/nativescript-angular/zone-js/dist/zone-nativescript.js:994:38\nfile:///app/tns_modules/nativescript-geolocation/geolocation.js:160:41\ninvoke@file:///app/tns_modules/tns-core-modules/timer/timer.js:54:53\nonInvoke@file:///app/tns_modules/@angular/core/bundles/core.umd.js:4787:39\nrunGuarded@file:///app/tns_modules/nativescript-angular/zone-js/dist/zone-nativescript.js:138:53\ntick@file:///app/tns_modules/tns-core-modules/timer/timer.js:19:26\nUIApplicationMain@[native code]\nstart@file:///app/tns_modules/tns-core-modules/application/application.js:258:26\nbootstrapApp@file:///app/tns_modules/nativescript-angular/platform-common.js:86:28\nbootstrapModule@file:///app/tns_modules/nativescript-angular/platform-common.js:72:26\nanonymous@file:///app/main.j
Any idea as to what may cause this? I don't care too much if this happens only on the simulator, I am a little worried it might also happen on a real device even though I have not seen it yet.
Thanks!
Which platform(s) does your issue occur on?
iOS simulator v10
Please, provide the following version numbers that your issue occurs with:
$ tns info
✔ Getting NativeScript components versions information...
⚠ Update available for component nativescript. Your current version is 4.1.0 and the latest available version is 4.1.1.
⚠ Update available for component tns-core-modules. Your current version is 3.4.1 and the latest available version is 4.1.0.
⚠ Update available for component tns-android. Your current version is 3.4.2 and the latest available version is 4.1.3.
⚠ Update available for component tns-ios. Your current version is 3.4.1 and the latest available version is 4.1.1.
{
"description": "MyApp",
"license": "SEE LICENSE IN <your-license-filename>",
"readme": "NativeScript Application",
"repository": "<fill-your-repository-here>",
"nativescript": {
"id": "com.abhayastudios.testapp",
"tns-ios": {
"version": "3.4.1"
},
"tns-android": {
"version": "3.4.2"
}
},
"dependencies": {
"@angular/animations": "~5.2.0",
"@angular/common": "~5.2.0",
"@angular/compiler": "~5.2.0",
"@angular/core": "~5.2.0",
"@angular/forms": "~5.2.0",
"@angular/http": "~5.2.0",
"@angular/platform-browser": "~5.2.0",
"@angular/platform-browser-dynamic": "~5.2.0",
"@angular/router": "~5.2.0",
"@teammaestro/nativescript-svg": "^1.0.1",
"moment": "^2.18.1",
"nativescript-angular": "~5.2.0",
"nativescript-bitmap-factory": "^1.7.1",
"nativescript-feedback": "^1.1.2",
"nativescript-geolocation": "^4.2.6",
"nativescript-gradient": "^2.0.1",
"nativescript-image-swipe": "^2.1.0",
"nativescript-imagepicker": "^5.0.0",
"nativescript-iqkeyboardmanager": "^1.2.0",
"nativescript-ngx-slides": "^1.0.0",
"nativescript-platform-css": "^1.6.5",
"nativescript-plugin-firebase": "^5.3.1",
"nativescript-social-share": "^1.5.0",
"nativescript-theme-core": "~1.0.4",
"nativescript-ui-listview": "^3.5.0",
"nativescript-webview-interface": "^1.4.1",
"reflect-metadata": "~0.1.8",
"rxjs": "~5.5.2",
"tns-core-modules": "~3.4.1",
"zone.js": "^0.8.16"
},
"devDependencies": {
"babel-traverse": "6.26.0",
"babel-types": "6.26.0",
"babylon": "6.18.0",
"lazy": "1.0.11",
"nativescript-dev-typescript": "~0.6.0",
"typescript": "~2.6.2"
}
Is there any code involved?
This the relevant part of my location.provider.ts:
/*
First obtain permissions to use location services if needed, then try to obtain user's location
*/
public saveUserLocation() {
return new Promise((resolve, reject) => {
geolocation.isEnabled().then((isEnabled:boolean) => {
/* already have location permissions */
if (isEnabled) {
this.getCurrentLocation().then((location) => {
resolve(location);
}, (error) => {
reject(error);
});
} else {
/* first request location permissions */
geolocation.enableLocationRequest().then(() => {
/* granted location permissions, now get location */
this.getCurrentLocation().then((location) => {
resolve(location);
}, (error) => {
reject(error);
});
}, (error) => {
console.error(`Failed to obtain location permissions: ${JSON.stringify(error)}`);
reject(error);
});
}
})
});
}
/*
Try to obtain user's location, assumes permissions are handled and save to user session if successful
Returns promise containing location
*/
private getCurrentLocation() {
return new Promise((resolve, reject) => {
geolocation.getCurrentLocation({
desiredAccuracy: Accuracy.any,
iosAllowsBackgroundLocationUpdates: false,
maximumAge: 5000, // in milliseconds
timeout: 5000, // in milliseconds
})
.then((location) => {
resolve(location);
}, (error) => {
console.error(`Failed to obtain user location: ${JSON.stringify(error)}`);
reject(error);
});
});
}
I think the error means a timeout was exceeded while searching for a location (i.e. no GPS lock was obtained on the device). In your case the simulator did not return a location. You should be able to handle this in your code by increasing the timeout or prompting the user to retry when a GPS lock is available. You can also play with the iOS simulator settings and enable location from the Debug menu.
@lini thanks for your reply. I have one of the Apple locations set in the simulator (which every now and then is obtained properly). Even increasing the timeout to 30k ms still results in the error above sometimes.
I tried using the demo app from this repository and the debug location feature of the simulator. I clicked Enable Location then Start Monitoring and the updates on screen were consistent with the selected debug location:
Can you try the demo app and see if there is a problem there for you?
@lini I have same problem. I changed locations like you, but still not working.
@lini
Using the demo app I get the error below on the iOS simulator (with location set) when tapping once the Get Current Location button triggering the getCurrentLocation method. Yet at the same time the Start Monitoring button which triggers the watchLocation method displays locations just fine!
app/main-page.js:57:20: Error: Timeout while searching for location!
After changing the promise reject callback to log (error.message || error) instead of the entire object, indeed I get the same timeout message as with the demo app.
Still, somehow there seems to be an issue with the getCurrentLocation on the iOS simulator. I will try to upgrade to the latest Xcode and see it the issue is solved.
Still happening after upgrading to latest Xcode (now 9.4.1). Anyway, as long as this happens only on the simulator, it is not that important to me.
This is still an issue, did you guys figure it out yet?
|
2025-04-01T06:37:17.884689
| 2014-10-14T15:09:03
|
45761636
|
{
"authors": [
"quicklizard99"
],
"license": "bsd-3-clause",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2022",
"repo": "NaturalHistoryMuseum/inselect",
"url": "https://github.com/NaturalHistoryMuseum/inselect/issues/94"
}
|
gharchive/issue
|
Hard-coded keyboard shortcuts in help text
The keyboard shortcuts in the help text are hard-coded. This duplicates the information provided elsewhere in the code, making it possible for the help text and the application to get out of sync.
#102 means that nearly all shortcuts are now documented in menus. Most of the text in Help, About is out of date. Suggest we remove Help, About and consider proper help pages in the future, if the need arises.
|
2025-04-01T06:37:17.891070
| 2021-06-26T10:40:31
|
930669191
|
{
"authors": [
"Hugo-ter-Doest",
"vibl"
],
"license": "mit",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2023",
"repo": "NaturalNode/natural",
"url": "https://github.com/NaturalNode/natural/issues/603"
}
|
gharchive/issue
|
natural.DiceCoefficient does not compute the Dice coefficient
Your algorithm count all bigram duplicates, whereas the Dice coefficient only count distinct bigrams.
Please have a look at Talisman, NLTK or the algorithms in many languages in https://en.wikibooks.org/wiki/Algorithm_Implementation/Strings/Dice's_coefficient for a proper implementation.
As an example, when comparing two Wikipedia articles with a Dice coefficient of 0.76, your algorithm outputs 0.42 (The two articles are the raw wikitext of https://en.wikipedia.org/wiki/French_Revolution and https://en.wikipedia.org/wiki/Influence_of_the_French_Revolution, you have to click on the Edit tab to get the wikitext).
Thanks for your feedback. I created a new version of the Dice coefficient module based on the algorithms site you mentioned. I added support for strings of length 1 and made it case insensitive. Like in the original version.
|
2025-04-01T06:37:17.907622
| 2022-05-17T17:51:02
|
1238973967
|
{
"authors": [
"Ne00n",
"devramsean0"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2024",
"repo": "Ne00n/woodCDN",
"url": "https://github.com/Ne00n/woodCDN/issues/12"
}
|
gharchive/issue
|
IPV6
Does this CDN allow for ipv6?
IPv6 is on ToDo on booth branches, so no.
But should be possible to add.
|
2025-04-01T06:37:17.911259
| 2022-09-23T16:41:03
|
1384051349
|
{
"authors": [
"FeepingCreature",
"dejlek"
],
"license": "BSD-3-Clause",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2025",
"repo": "Neat-Lang/neat",
"url": "https://github.com/Neat-Lang/neat/pull/13"
}
|
gharchive/pull-request
|
Now you can set LLVM_CONFIG when you run build.sh
As the title says.
What I needed was something like this to work: LLVM_CONFIG=/usr/bin/llvm-config-14 ./build.sh
hooray
|
2025-04-01T06:37:17.923910
| 2017-04-21T04:50:11
|
223275435
|
{
"authors": [
"DavidVorick"
],
"license": "mit",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2026",
"repo": "NebulousLabs/Sia",
"url": "https://github.com/NebulousLabs/Sia/pull/1734"
}
|
gharchive/pull-request
|
New persist
man... diff was too aggresive. json.go is a completely new file, jsonold.go is the old json.go, and if you want to read the code in a more sane way, you should just view it as a standalone file.
Still writing more comprehensive tests, but I wanted to see how the checksum parser worked on Windows. I'm wondering if a different approach to newlines will screw up my byte-parsing.
This PR is intended to address the file corruption error that has been occasionally wiping out users files after a hard shutdown. This new method has more safety around it, and notably does not use os.Rename at all to preserve safety.
|
2025-04-01T06:37:17.959394
| 2015-03-19T22:49:54
|
63108907
|
{
"authors": [
"kalta",
"liveforeverx"
],
"license": "apache-2.0",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2029",
"repo": "Nekso/nkbase",
"url": "https://github.com/Nekso/nkbase/issues/2"
}
|
gharchive/issue
|
Strong consistency support for ets
"Strong consistency only support the leveldb backend currently."
Do you have a plan to support ets backend in some future?
Hi,
Right now it does not make any sense, since the strong consistency backend (riak_ensemble) goes to disk for the tree.
|
2025-04-01T06:37:17.967743
| 2016-09-30T08:44:21
|
180251179
|
{
"authors": [
"VagishVela",
"donofriov"
],
"license": "mit",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2030",
"repo": "Neo11/ChitChat",
"url": "https://github.com/Neo11/ChitChat/issues/48"
}
|
gharchive/issue
|
Task: Update readme with new emoji's that have been added.
Some emoji's were fixed and some were added. Update the readme with the ones that were added from #44
@VagishVela it looks like the readme was updated as part of that PR already https://github.com/Neo11/ChitChat/pull/44/files -- Am I missing something?
@donofriov Whoops my bad.
|
2025-04-01T06:37:17.992970
| 2024-04-25T20:26:52
|
2264433737
|
{
"authors": [
"CKolkey",
"EarthyOrange",
"asmodeus812"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2031",
"repo": "NeogitOrg/neogit",
"url": "https://github.com/NeogitOrg/neogit/issues/1260"
}
|
gharchive/issue
|
Can't open multiple Neogit tabs in a window
Description
I want to open multiple Neogit tabs (https://neovim.io/doc/user/tabpage.html) in 1 Neovim window but every time I run the command :tab Neogit cwd=<git dir>, the new git directory is opened in the current tab. Therefore, I can run only 1 instance of Neogit in 1 window.
Neovim version
NVIM v0.9.4
Build type: Release
LuaJIT 2.1.0-beta3
Operating system and version
macOS 13.6.4
Steps to reproduce
On terminal run nvim
On nvim run :Neogit cwd=<git-dir-1>
On nvim run :tab Neogit cwd=<git-dir-2>
Expected behavior
There should be 2 Neogit tabs pointing to respective git directories.
Actual behavior
On nvim run :Neogit cwd=<git-dir-1>:
The current tab shows Neogit instance pointing to git-dir-1
On nvim run :tab Neogit cwd=<git-dir-2>:
A new blank second tab is opened
The first tab now points to git-dir-2
No tab points to git-dir-1
Minimal config
-- NOTE: See the end of this file if you are reporting an issue, etc. Ignore all the "scary" functions up top, those are
-- used for setup and other operations.
local M = {}
local base_root_path = vim.fn.fnamemodify(debug.getinfo(1, "S").source:sub(2), ":p:h") .. "/.min"
function M.root(path)
return base_root_path .. "/" .. (path or "")
end
function M.load_plugin(plugin_name, plugin_url)
local package_root = M.root("plugins/")
local install_destination = package_root .. plugin_name
vim.opt.runtimepath:append(install_destination)
if not vim.loop.fs_stat(package_root) then
vim.fn.mkdir(package_root, "p")
end
if not vim.loop.fs_stat(install_destination) then
print(string.format("> Downloading plugin '%s' to '%s'", plugin_name, install_destination))
vim.fn.system({
"git",
"clone",
"--depth=1",
plugin_url,
install_destination,
})
if vim.v.shell_error > 0 then
error(string.format("> Failed to clone plugin: '%s' in '%s'!", plugin_name, install_destination),
vim.log.levels.ERROR)
end
end
end
---@alias PluginName string The plugin name, will be used as part of the git clone destination
---@alias PluginUrl string The git url at which a plugin is located, can be a path. See https://git-scm.com/book/en/v2/Git-on-the-Server-The-Protocols for details
---@alias MinPlugins table<PluginName, PluginUrl>
---Do the initial setup. Downloads plugins, ensures the minimal init does not pollute the filesystem by keeping
---everything self contained to the CWD of the minimal init file. Run prior to running tests, reproducing issues, etc.
---@param plugins? table<PluginName, PluginUrl>
function M.setup(plugins)
vim.opt.packpath = {} -- Empty the package path so we use only the plugins specified
vim.opt.runtimepath:append(M.root(".min")) -- Ensure the runtime detects the root min dir
-- Install required plugins
if plugins ~= nil then
for plugin_name, plugin_url in pairs(plugins) do
M.load_plugin(plugin_name, plugin_url)
end
end
vim.env.XDG_CONFIG_HOME = M.root("xdg/config")
vim.env.XDG_DATA_HOME = M.root("xdg/data")
vim.env.XDG_STATE_HOME = M.root("xdg/state")
vim.env.XDG_CACHE_HOME = M.root("xdg/cache")
-- NOTE: Cleanup the xdg cache on exit so new runs of the minimal init doesn't share any previous state, e.g. shada
vim.api.nvim_create_autocmd("VimLeave", {
callback = function()
vim.fn.system({
"rm",
"-r",
"-f",
M.root("xdg")
})
end
})
end
-- NOTE: If you have additional plugins you need to install to reproduce your issue, include them in the plugins
-- table within the setup call below.
M.setup({
plenary = "https://github.com/nvim-lua/plenary.nvim.git",
telescope = "https://github.com/nvim-telescope/telescope.nvim",
diffview = "https://github.com/sindrets/diffview.nvim",
neogit = "https://github.com/NeogitOrg/neogit"
})
-- WARN: Do all plugin setup, test runs, reproductions, etc. AFTER calling setup with a list of plugins!
-- Basically, do all that stuff AFTER this line.
require("neogit").setup({}) -- For instance, setup Neogit
Not a bug - that's how it works on master. However, I've improved the experience a lot on the nightly branch, which will be released with nvim 0.10. Better CWD handling, that sort of thing. Try it out :)
@CKolkey did try that myself, i have kind=tab, seems like if you already have an opened neogit status in a tab, if you call Neogit cwd=... again the neogit tab is not focused (but if you manually go to the tab it seems the state is updated). Tried on nightly with .setup() call.
Is there a way allowing us to have multiple tabs opened for git status each for unique cwd ? I have a similar use case as the OP, where i might have multiple files from multiple working directories opened in the current nvim window. So instead of updaing the current neogit tab status if it exists, it will open a new tab for the cwd, if a tab for that cwd exists, then it can be focused and updated (working similarly to what is intended atm) - could be an opt in. Not sure how it would work with kind=split, but this could be only applicable for kind=tab wdyt ?
It's going to require a bit of doing.. I use vim.uv.getcwd() all over to find the correct status buffer instance and repository object. I'm beginning to think that relying on that was a mistake in the first place as it's effectively a global variable. It's no issue to run git against a specific directory with the -C flag, but what I need to do is start passing the CWD into pretty much every constructor function, so it can either be consumed (run a git command) or passed on to a buffer that would consume it.
Not a huge change, I think, but a bit tedious. However, it would mean that tabs/splits/whatever could point to a project directory and all coexist.
|
2025-04-01T06:37:18.001134
| 2024-05-29T19:38:16
|
2324111289
|
{
"authors": [
"CKolkey",
"astrelinvl"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2032",
"repo": "NeogitOrg/neogit",
"url": "https://github.com/NeogitOrg/neogit/issues/1340"
}
|
gharchive/issue
|
Error "Neogit has not been setup!"
Description
After adding the plugin to Lazy and using the :Neogit command, it gives the error: "Neogit has not been setup!"
P.S.
I'm new to neovim
Neovim version
NVIM v0.9.1
Build type: Release
LuaJIT 2.1.0-beta3
Operating system and version
macOs 13.1 (Ventura) m1
Steps to reproduce
add the code to lua/plugins/neogit.lua:
`
return {
{
"NeogitOrg/neogit",
dependencies = {
"nvim-lua/plenary.nvim", -- required
"sindrets/diffview.nvim", -- optional - Diff integration
-- Only one of these is needed, not both.
"nvim-telescope/telescope.nvim", -- optional
-- "ibhagwan/fzf-lua", -- optional
},
cmd = "Neogit",
config = true,
},
}
`
Go to a new terminal window
Open a project
Run the command :Neogit
Expected behavior
No response
Actual behavior
The error "Neogit has not been setup!" is displayed.
Minimal config
-- NOTE: See the end of this file if you are reporting an issue, etc. Ignore all the "scary" functions up top, those are
-- used for setup and other operations.
local M = {}
local base_root_path = vim.fn.fnamemodify(debug.getinfo(1, "S").source:sub(2), ":p:h") .. "/.min"
function M.root(path)
return base_root_path .. "/" .. (path or "")
end
function M.load_plugin(plugin_name, plugin_url)
local package_root = M.root("plugins/")
local install_destination = package_root .. plugin_name
vim.opt.runtimepath:append(install_destination)
if not vim.loop.fs_stat(package_root) then
vim.fn.mkdir(package_root, "p")
end
if not vim.loop.fs_stat(install_destination) then
print(string.format("> Downloading plugin '%s' to '%s'", plugin_name, install_destination))
vim.fn.system({
"git",
"clone",
"--depth=1",
plugin_url,
install_destination,
})
if vim.v.shell_error > 0 then
error(string.format("> Failed to clone plugin: '%s' in '%s'!", plugin_name, install_destination),
vim.log.levels.ERROR)
end
end
end
---@alias PluginName string The plugin name, will be used as part of the git clone destination
---@alias PluginUrl string The git url at which a plugin is located, can be a path. See https://git-scm.com/book/en/v2/Git-on-the-Server-The-Protocols for details
---@alias MinPlugins table<PluginName, PluginUrl>
---Do the initial setup. Downloads plugins, ensures the minimal init does not pollute the filesystem by keeping
---everything self contained to the CWD of the minimal init file. Run prior to running tests, reproducing issues, etc.
---@param plugins? table<PluginName, PluginUrl>
function M.setup(plugins)
vim.opt.packpath = {} -- Empty the package path so we use only the plugins specified
vim.opt.runtimepath:append(M.root(".min")) -- Ensure the runtime detects the root min dir
-- Install required plugins
if plugins ~= nil then
for plugin_name, plugin_url in pairs(plugins) do
M.load_plugin(plugin_name, plugin_url)
end
end
vim.env.XDG_CONFIG_HOME = M.root("xdg/config")
vim.env.XDG_DATA_HOME = M.root("xdg/data")
vim.env.XDG_STATE_HOME = M.root("xdg/state")
vim.env.XDG_CACHE_HOME = M.root("xdg/cache")
-- NOTE: Cleanup the xdg cache on exit so new runs of the minimal init doesn't share any previous state, e.g. shada
vim.api.nvim_create_autocmd("VimLeave", {
callback = function()
vim.fn.system({
"rm",
"-r",
"-f",
M.root("xdg")
})
end
})
end
-- NOTE: If you have additional plugins you need to install to reproduce your issue, include them in the plugins
-- table within the setup call below.
M.setup({
plenary = "https://github.com/nvim-lua/plenary.nvim.git",
telescope = "https://github.com/nvim-telescope/telescope.nvim",
diffview = "https://github.com/sindrets/diffview.nvim",
neogit = "https://github.com/NeogitOrg/neogit"
})
-- WARN: Do all plugin setup, test runs, reproductions, etc. AFTER calling setup with a list of plugins!
-- Basically, do all that stuff AFTER this line.
require("neogit").setup({}) -- For instance, setup Neogit
I believe you want opts = {} instead of config = true :)
I managed to remove this error by updating neovim to the latest version :-)
|
2025-04-01T06:37:18.061334
| 2019-10-05T05:54:57
|
502921126
|
{
"authors": [
"guyjacob",
"hoseung2"
],
"license": "Apache-2.0",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2033",
"repo": "NervanaSystems/distiller",
"url": "https://github.com/NervanaSystems/distiller/issues/398"
}
|
gharchive/issue
|
Quantization dequanitze flag
Hi, while looking at the quantization function I found that there is a dequantize flag.
But as I think, the network should be forwarded to the dequantized value.
What's the purpose of the dequantize flag?
In other words, what's the difference between dequantized and non-dequantized cases?
Thank you.
I'm not sure what you mean by "the network should be forwarded to the dequantized value", but in any case, this is a utility function called from many places:
In some cases we want to just get the effect of quantization but still let the model run with float tensors (aka "fake-quantization"). This is common in quantization-aware training scenarios. In these cases we'll set dequantize=True.
In other cases we want to quantize a tensor and keep working on the quantized values. This happens in post-training quantization.
That's what I exactly wanted to know.
Thank you so much
|
2025-04-01T06:37:18.066498
| 2019-07-15T04:58:29
|
467941195
|
{
"authors": [
"aprocter",
"nmostafa"
],
"license": "apache-2.0",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2034",
"repo": "NervanaSystems/ngraph",
"url": "https://github.com/NervanaSystems/ngraph/pull/3225"
}
|
gharchive/pull-request
|
[MLIR] Concat
Adds support for Concat to MLIR compiler/lowerer.
All but two tests in CPU.concat* are passing. The two that are failing are triggering this check in compiled_kernel.cpp: https://github.com/NervanaSystems/ngraph/blob/3f6cda4c22636fb5c0b7d2038eb4676712504671/src/ngraph/op/experimental/compiled_kernel.cpp#L78
I think this failure is unrelated to this PR, other than the fact that this PR exposes these tests to the MLIR/compiled_kernel machinery.
Example dump thru affine dialect:
[ RUN ] CPU.concat_5d
*** nGraph Dialect Dump: ***
func @main(%arg0: !ng.tensor<2x3x3x3x2xf32>, %arg1: !ng.tensor<2x3x2x3x2xf32>, %arg2: !ng.tensor<2x3x4x3x2xf32>) -> !ng.tensor<2x3x9x3x2xf32> {
%0 = "ng.concat"(%arg2, %arg0, %arg1) {concatenation_axis = 2 : i64} : (!ng.tensor<2x3x4x3x2xf32>, !ng.tensor<2x3x3x3x2xf32>, !ng.tensor<2x3x2x3x2xf32>) -> !ng.tensor<2x3x9x3x2xf32>
"ng.return"(%0) : (!ng.tensor<2x3x9x3x2xf32>) -> ()
}
*** Affine Dialect Dump: ***
#map0 = () -> (0)
#map1 = () -> (2)
#map2 = () -> (3)
#map3 = () -> (4)
#map4 = (d0) -> (d0 + 4)
#map5 = (d0) -> (d0 + 7)
func @main(%arg0: memref<2x3x3x3x2xf32>, %arg1: memref<2x3x2x3x2xf32>, %arg2: memref<2x3x4x3x2xf32>, %arg3: memref<2x3x9x3x2xf32>, %arg4: index) {
affine.for %i0 = 0 to 2 {
affine.for %i1 = 0 to 3 {
affine.for %i2 = 0 to 4 {
affine.for %i3 = 0 to 3 {
affine.for %i4 = 0 to 2 {
%0 = load %arg2[%i0, %i1, %i2, %i3, %i4] : memref<2x3x4x3x2xf32>
store %0, %arg3[%i0, %i1, %i2, %i3, %i4] : memref<2x3x9x3x2xf32>
}
}
}
}
}
affine.for %i5 = 0 to 2 {
affine.for %i6 = 0 to 3 {
affine.for %i7 = 0 to 3 {
%1 = affine.apply #map4(%i7)
affine.for %i8 = 0 to 3 {
affine.for %i9 = 0 to 2 {
%2 = load %arg0[%i5, %i6, %i7, %i8, %i9] : memref<2x3x3x3x2xf32>
store %2, %arg3[%i5, %i6, %1, %i8, %i9] : memref<2x3x9x3x2xf32>
}
}
}
}
}
affine.for %i10 = 0 to 2 {
affine.for %i11 = 0 to 3 {
affine.for %i12 = 0 to 2 {
%3 = affine.apply #map5(%i12)
affine.for %i13 = 0 to 3 {
affine.for %i14 = 0 to 2 {
%4 = load %arg1[%i10, %i11, %i12, %i13, %i14] : memref<2x3x2x3x2xf32>
store %4, %arg3[%i10, %i11, %3, %i13, %i14] : memref<2x3x9x3x2xf32>
}
}
}
}
}
return
}
You can remove the compiled_kernel assert. It is left-over from previous purpose of that node. Nodes obviously don't need to be of same type/shape.
@dcaballe Regarding tests:
$ NGRAPH_MLIR=1 test/unit-test --gtest_filter='CPU.*concat*'
Note: Google Test filter = CPU.*concat*
[==========] Running 16 tests from 1 test case.
[----------] Global test environment set-up.
[----------] 16 tests from CPU
[ RUN ] CPU.concat_matrix_colwise
[ OK ] CPU.concat_matrix_colwise (12 ms)
[ RUN ] CPU.concat_matrix_rowwise
[ OK ] CPU.concat_matrix_rowwise (9 ms)
[ RUN ] CPU.concat_matrix_int64
[ OK ] CPU.concat_matrix_int64 (8 ms)
[ RUN ] CPU.concat_vector
[ OK ] CPU.concat_vector (6 ms)
[ RUN ] CPU.concat_4d_tensor
[ OK ] CPU.concat_4d_tensor (9 ms)
[ RUN ] CPU.concat_2d_tensor
[ OK ] CPU.concat_2d_tensor (7 ms)
[ RUN ] CPU.concat_in_place_2d_tensor
[ OK ] CPU.concat_in_place_2d_tensor (9 ms)
[ RUN ] CPU.concat_in_place_propagate_2d_tensor
/localdisk/amprocte/Work/ngraph/build/test/backend_test_CPU.cpp:1031: Failure
Value of: test::all_close_f( (vector<float>{3, 7, 2}), read_vector<float>(result), MIN_FLOAT_TOLERANCE_BITS)
Actual: false (7 is not close to 2 at index 1
2 is not close to 0 at index 2
diff count: 2 out of 3
passing criteria - mismatch allowed @ mantissa bit: 24 or later (0 tolerance bits)
0 value(s) below min_signal: 0
tightest match - mismatch occurred @ mantissa bit: 24 or next bit (3 vs 3 at [0])
loosest match - mismatch occurred @ mantissa bit: 0 or next bit (2 vs 0 at [2])
median match - mismatch occurred @ mantissa bit: 0 or next bit
)
Expected: true
[ FAILED ] CPU.concat_in_place_propagate_2d_tensor (9 ms)
[ RUN ] CPU.concat_5d
[ OK ] CPU.concat_5d (53 ms)
[ RUN ] CPU.concat_zero_length_1d_last
[ OK ] CPU.concat_zero_length_1d_last (5 ms)
[ RUN ] CPU.concat_zero_length_1d_middle
[ OK ] CPU.concat_zero_length_1d_middle (5 ms)
[ RUN ] CPU.concat_zero_zero
[ OK ] CPU.concat_zero_zero (1 ms)
[ RUN ] CPU.concat_zero_length_4d_middle
[ OK ] CPU.concat_zero_length_4d_middle (9 ms)
[ RUN ] CPU.backwards_concat_vector
[ OK ] CPU.backwards_concat_vector (8 ms)
[ RUN ] CPU.backwards_concat_axis_0
[ OK ] CPU.backwards_concat_axis_0 (11 ms)
[ RUN ] CPU.backwards_concat_axis_1
[ OK ] CPU.backwards_concat_axis_1 (134 ms)
[----------] 16 tests from CPU (295 ms total)
[----------] Global test environment tear-down
[==========] 16 tests from 1 test case ran. (296 ms total)
[ PASSED ] 15 tests.
[ FAILED ] 1 test, listed below:
[ FAILED ] CPU.concat_in_place_propagate_2d_tensor
1 FAILED TEST
17:33:02.208622: [MAIN] Tests finished: Time: 297 ms Exit code: 1
With NGRAPH_MLIR_DUMP_ALL=1, all the above are dumping reasonable-looking affine code.
The failed test is probably due to the issue we've been discussing on Slack.
@dcaballe @nmostafa I think comments are addressed at this point. Let me know.
|
2025-04-01T06:37:18.076764
| 2023-02-15T20:05:38
|
1586479805
|
{
"authors": [
"Hardikl",
"cgrinds"
],
"license": "Apache-2.0",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2035",
"repo": "NetApp/harvest",
"url": "https://github.com/NetApp/harvest/issues/1738"
}
|
gharchive/issue
|
Revisit counter dash to underscore replacement logic
As raised by jfong on Discord
This logic happens here
Replacement of dash to underscore happens automatically when you don't use the rename => marker, and yes, that behavior is used extensively in zapi templates. Perhaps the idea is if you rename, you get the final call to decide on the name (even if it's wrong). That may be questionable 🙂
As noted Prometheus does not permit dashes - in labels.
ONTAP REST documentation states:
However, REST converts hyphens - in CLI parameter names to underscores _ in the REST API JSON response body.
We have investigated on this issue and below is the summary:
--> Prometheus would not supporting the hyphen (-) in metric/label names and erroring out, Whereas InfluxDB can support the hyphen(-).
--> Harvest's behaviour would be if we have the rename marker => in the template, then Harvest will honour that display
name as-is. If we don't have the rename marker => in template, then Harvest will try to help and generate display name accordingly.
The solution which we all are agreed on is, if the rename marker => exist in template, Then Harvest should not intervene and honour the display name as-is.
|
2025-04-01T06:37:18.090022
| 2017-04-25T21:06:18
|
224272212
|
{
"authors": [
"whonow"
],
"license": "apache-2.0",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2036",
"repo": "NetDocuments/ad-join-cookbook",
"url": "https://github.com/NetDocuments/ad-join-cookbook/issues/24"
}
|
gharchive/issue
|
Need help
Now my screen rotated on my laptop
My Toshiba laptop his rotated the screen upside down by its self
|
2025-04-01T06:37:18.130548
| 2016-12-07T15:46:33
|
194085021
|
{
"authors": [
"karteeksaragad",
"mattrjacobs",
"mohamedanees",
"prakhar241"
],
"license": "apache-2.0",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2037",
"repo": "Netflix/Hystrix",
"url": "https://github.com/Netflix/Hystrix/issues/1436"
}
|
gharchive/issue
|
Question regarding maximumSize and coreSize
I have set the maximum size of thread pool to be 10 and the core size as 2. The requests are getting queued(if more than 2 requests are made) instead of creating a new thread on the threadpool.
As far as my knowledge, the thread pool must support 10 threads to the maximum and then queue the subsequent requests. If the number of requests is less, and the other 8 threads on the threadpool are not assigned any tasks,then they must wait for utmost 1 minute to get destroyed (But the thread pool will still contain 2 daemon threads even if no requests are made). But this is not happening in my case. Kindly advise if my understanding is right!
Can you retry with 1.5.9 (just released)? If the issue still exists, I can dig in.
@mattrjacobs Still this issue is persisting. I tried using 1.5.9. Kindly suggest.
Can you inspect the configuration of the running system to see what values are being used? You can use the Hystrix configuration stream or do something manual by inspecting Hystrix objects and logging values out.
Hi @mattrjacobs,
Thanks for your help all the way,its working fine with latest version. I forgot to reconfigure after updating the hystrix jar to 1.5.9. Closing this issue 👍
@mohamedanees : I have the same problem with dynamic hystrix thread pool settings, not working expected. I am using hystrix 1.5.12 (maximumSize=100, coreSize=60 and allowMaximumSizeToDivergeFromCoreSize=true). Can you let me know what is that you forgot to reconfigure to fix the issue???
@karteeksaragad - I'm facing similar issue with 1.5.12. Did it work for you?
@mattrjacobs
|
2025-04-01T06:37:18.139452
| 2015-09-09T21:09:13
|
105685066
|
{
"authors": [
"cloudbees-pull-request-builder",
"mattrjacobs"
],
"license": "apache-2.0",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2038",
"repo": "Netflix/Hystrix",
"url": "https://github.com/Netflix/Hystrix/pull/886"
}
|
gharchive/pull-request
|
Only lookup if the request cache is enabled once per command invocation
This helps performance and eliminates chance that start/end of command see this value differently
NetflixOSS » Hystrix » Hystrix-pull-requests #169 SUCCESS
This pull request looks good
|
2025-04-01T06:37:18.141484
| 2015-09-15T23:42:28
|
106669822
|
{
"authors": [
"cloudbees-pull-request-builder",
"scottmcmaster"
],
"license": "apache-2.0",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2039",
"repo": "Netflix/Priam",
"url": "https://github.com/Netflix/Priam/pull/421"
}
|
gharchive/pull-request
|
Upgrade tests to use JMockit 1.19, which is compatible with newer ver…
…sions of Java; also fix CassandraAdminTest failure caused as regression in 49865ab. Addresses the comment in issue #415
NetflixOSS » Priam » Priam-pull-requests #25 SUCCESS
This pull request looks good
Priam-pull-requests #187 SUCCESS
This pull request looks good
|
2025-04-01T06:37:18.142453
| 2024-02-27T13:47:15
|
2156638904
|
{
"authors": [
"mtb0x1",
"nickodell"
],
"license": "Apache-2.0",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2040",
"repo": "Netflix/bpftop",
"url": "https://github.com/Netflix/bpftop/pull/12"
}
|
gharchive/pull-request
|
fix: avoid crash when navigation keys used with an empty console
using navigation keys (up, down) with an empty console results in a panic with out-of-band error.
@mtb0x1 Thanks for this fix. I ran into the same problem.
|
2025-04-01T06:37:18.144865
| 2020-11-02T21:28:57
|
734836186
|
{
"authors": [
"apanicker-nflx",
"djcass44",
"rmohta"
],
"license": "apache-2.0",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2041",
"repo": "Netflix/conductor",
"url": "https://github.com/Netflix/conductor/issues/1952"
}
|
gharchive/issue
|
go client: No Domain when polliing for task
When using go client with an empty string domain, it's creating below GET call, which I think Conductor server does not like. Removing domain=& from the call works for polling. Is this is a known bug?
2020/11/02 14:19:23 Sending [ GET ] request to Server ( http://localhost:8080/api/tasks/poll/get_model?workerid=C02&domain=& ):
2020/11/02 14:19:23 Body:
2020/11/02 14:19:23
2020/11/02 14:19:24 Received response from Server ( http://localhost:8080/api ):
2020/11/02 14:19:24 Status: 204 No Content
2020/11/02 14:19:24 Response:
2020/11/02 14:19:24
Go client
github.com/netflix/conductor/client/go v0.0.0-20201029170655-6bce3912d3ce
@djcass44 Could you please help with this potential issue in the go client? Thank you.
@apanicker-nflx I've implemented a possible fix in #1976, are you able to take a look?
|
2025-04-01T06:37:18.159628
| 2023-09-20T16:45:52
|
1905377746
|
{
"authors": [
"whitdog47",
"wssheldon"
],
"license": "Apache-2.0",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2042",
"repo": "Netflix/dispatch",
"url": "https://github.com/Netflix/dispatch/pull/3795"
}
|
gharchive/pull-request
|
Timeline enhancements
This PR includes many enhancements to the incident timeline, including:
Direct link to the timeline for an incident. Users can now browse to .../{org_name}/incidents/{incident_name}/timeline to open the incident view directly to the timeline.
The incident details view pane is now expandable by a click and drag on the vertical divider line.
Icons in the timeline bubbles quickly indicate the type of event.
The incident timeline now has filtering to show/hide different kinds of events, with system events hidden by default.
Users can now add custom events to the timeline directly in the UI by hovering between existing events in the timeline and click the "Add event" button.
Custom events can be edited and/or deleted by the incident commander or reporter.
Messages imported from Slack with the reaction event can now be edited and/or deleted by the incident commander or reporter.
One thing that stands out form a UX perspective in the timeline is user actions vs system actions look very similar. I think it'd help to differentiate them more.
For example, the icon for the user actions could be the users profile picture and names could be bolded/clickable with the user popover component we have.
A minor thing from last screenshot -- the delete / edit icons probably fit best positioned all the way right, under the date. that way they wont cover the text or interfere with the content if it is rich (hoverable/clickable) in the future
One thing that stands out form a UX perspective in the timeline is user actions vs system actions look very similar. I think it'd help to differentiate them more.
For example, the icon for the user actions could be the users profile picture and names could be bolded/clickable with the user popover component we have.
Will pull these ideas into a phase 2, which will align the entire Incident edit/view with the new Case UI.
|
2025-04-01T06:37:18.164080
| 2020-03-19T17:22:10
|
584574408
|
{
"authors": [
"savingoyal",
"themantalope"
],
"license": "Apache-2.0",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2043",
"repo": "Netflix/metaflow",
"url": "https://github.com/Netflix/metaflow/issues/162"
}
|
gharchive/issue
|
link two flows
Not sure if I just haven't found the right verbage in the documentations, or if there are other built in ways to do this but I want to be able to prospectively link two flows together. For example, let's say there is FlowA and FlowB, and FlowA for example pre-processes data that gets utilized in FlowB. Is there a way I can make sure that I know which data from FlowA was utilized by a certain run in FlowB? One way I guess would be to tag both flows with the same tag or unique ID, does anyone know how to programmatically tag a flow within itself? Should I just combine the two flows into one?
Thanks
@themantalope Tagging is definitely one approach. How are you currently accessing data from FlowA in your FlowB? You could simply store the relevant run id for FlowA in FlowB and access it using the Client API.
We have #159 open which will provide programmatic capabilities for tagging a flow retrospectively.
I see, so in the first step of FlowB I could do something link
from metaflow import FlowSpec, Flow
class FlowB(FlowSpec):
@step
def start(self):
self.last_flow_a_run_id = Flow('FlowA').latest_run.run_id
// rest of code etc.
And when the data from the FlowB is stored, the data in last_flow_a_run_id will get saved to disk, correct?
Yep, correct.
Great! Really appreciate it!
|
2025-04-01T06:37:18.170291
| 2019-12-10T14:01:29
|
535749389
|
{
"authors": [
"jasonmit",
"offirgolan",
"tamlyn"
],
"license": "Apache-2.0",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2044",
"repo": "Netflix/pollyjs",
"url": "https://github.com/Netflix/pollyjs/issues/279"
}
|
gharchive/issue
|
Strange behaviour matching request modified in beforePersist
Description
I think this is a bug but there's always a chance it's a feature and I haven't understood something.
I'm testing an authentication flow and I don't want the real auth tokens to be committed to the repo. I've set up a beforePersist middleware to replace real-token with dummy-token in the POST bodies. When recording I make the requests with real-token. Then when running my tests against the recordings I make the requests with dummy-token. I would expect this to work because the real-token was changed to dummy-token when saving the HAR. But it doesn't: the request doesn't match.
The really strange thing is that if I run the test against the recordings but using the original real-token that I used when making the recordings it passes, even though that token doesn't appear in the HAR file. How does Polly remember the original token even when I've removed it from the HAR?
I've created a minimal test case here https://github.com/tamlyn/polly-test-case to illustrate the problem.
Node.js v12.13.1
darwin 17.7.0
npm 6.11.3
yarn 1.19.2
@tamlyn even though you're storing the dummy-token in the HAR file, you're still making the request with the real-token. Polly calculates the request's id based on the request you made (not whats stored in the HAR), so you would need to tell Polly to ignore the token altogether. You can do so via matchRequestsBy.
Ah! So the _id is a hash of the request? I thought it was random. Is that documented anywhere? Is the request object as stored in the HAR used for anything?
So the _id is a hash of the request
Correct
Is that documented anywhere?
https://netflix.github.io/pollyjs/#/configuration?id=matchrequestsby
Is the request object as stored in the HAR used for anything?
For completeness with the HAR spec (importing into a HAR tool to inspect for example). In the future, we may leverage it more.
|
2025-04-01T06:37:18.174497
| 2017-02-21T17:49:49
|
209222176
|
{
"authors": [
"GJL",
"avoosh"
],
"license": "apache-2.0",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2045",
"repo": "Netflix/zuul",
"url": "https://github.com/Netflix/zuul/issues/307"
}
|
gharchive/issue
|
Configuring PoolingHttpClientConnectionManager with Time to Live?
Hi all,
I am using zuul to route requests to statically configured services according to the request path.
The services behind zuul are addressed using DNS names. The DNS records can change rather frequently (e.g., daily).
I have seen in SimpleHostRoutingFilter that zuul uses PoolingHttpClientConnectionManager from Apache HttpComponents without configuring the time to live for the connections in the pool
(see https://github.com/Netflix/zuul/blob/939ada9dce57709cf6b250b77fabfa37e8d988bf/zuul-simple-webapp/src/main/groovy/filters/route/SimpleHostRoutingFilter.groovy#L97). Even if the DNS records change, the connection pool in zuul is keeping the connections to the old instances open. Depending on the load, it can take many hours until all the old connections are evicted from the connection pool.
I could subclass SimpleHostRoutingFilter and override the method newConnectionManager() to return my own instance of PoolingHttpClientConnectionManager with a configured TTL. Is there any other way to solve my problem, and does it make sense to add this feature to zuul?
Best,
Gary
@GJL Hi, I am facing the same behaviour, how did you end up?
@avoosh I moved the issue to https://github.com/spring-cloud/spring-cloud-netflix/issues/1720
|
2025-04-01T06:37:18.203342
| 2022-01-23T20:47:18
|
1111981662
|
{
"authors": [
"InProgress18",
"matthewfeickert"
],
"license": "BSD-3-Clause",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2046",
"repo": "Neubauer-Group/GNN_code",
"url": "https://github.com/Neubauer-Group/GNN_code/pull/1"
}
|
gharchive/pull-request
|
Add Multi-GPU Training
Multi-GPU training was added using the HuggingFace Accelerate package. Installation shell script was also updated to work with new and updated packages.
@markusatkinson this is ready for review.
|
2025-04-01T06:37:18.204255
| 2024-12-09T01:21:02
|
2725712148
|
{
"authors": [
"NeverSinkDev",
"Xandaros"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2047",
"repo": "NeverSinkDev/NeverSink-PoE2litefilter",
"url": "https://github.com/NeverSinkDev/NeverSink-PoE2litefilter/pull/2"
}
|
gharchive/pull-request
|
Add Linux path to README
Added the path for the filters on Linux. Also changed the formatting a bit (code instead if italic) and replaced the forward slashes with back slashes on Windows, since that is the canonical path separator there.
Thanks, added
|
2025-04-01T06:37:18.205901
| 2015-04-08T15:20:12
|
67153779
|
{
"authors": [
"BloodyRookie",
"fyahfox"
],
"license": "mit",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2048",
"repo": "NewEconomyMovement/NemCommunityClient",
"url": "https://github.com/NewEconomyMovement/NemCommunityClient/issues/390"
}
|
gharchive/issue
|
Harvested blocks are added when switching accounts
0.6.26-BETA
"When I switch between accounts with the "HARVESTED BLOCKS" tab selected the previous accounts harvested blocks gets added to the currently selected accounts harvested blocks."
https://forum.ournem.com/technical-discussion/nem-beta-0-6-26-security-update/msg15902/#msg15902
Can anybody confirm the behavior with version 0.6.28?
|
2025-04-01T06:37:18.246757
| 2024-11-11T15:42:38
|
2649707556
|
{
"authors": [
"Neo23x0",
"gibranalvinda",
"simonstegard"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2049",
"repo": "NextronSystems/velociraptor-artifacts-thor",
"url": "https://github.com/NextronSystems/velociraptor-artifacts-thor/issues/7"
}
|
gharchive/issue
|
ThorZIP: executable file not found in %PATH%
I'm trying to run Generic.Scanner.ThorZIP but it's not working. I have uploaded the zip using ThorZIP tool, I tried both zip with included license and unmodified zip downloaded directly from website, but same problem.
{"client_time":1731337531,"level":"INFO","message":"Starting query execution for Generic.Scanner.ThorZIP/ThorExec.\n"}
{"client_time":1731337531,"level":"DEFAULT","message":"tempfile: removing tempfile C:\\Program Files\\Velociraptor\\Tools\\tmp391399109\n"}
{"client_time":1731337531,"level":"DEFAULT","message":"tempfile: removed tempfile C:\\Program Files\\Velociraptor\\Tools\\tmp391399109\n"}
{"client_time":1731337532,"level":"DEFAULT","message":"Sleeping 7 Seconds\n"}
{"client_time":1731337539,"level":"DEFAULT","message":"URL for thor10.7lite-win-pack_nolic.zip is at https://xxx.azurewebsites.net/file/thor10.7lite-win-pack_nolic.zip and has hash of c1a306af9e9162d14d52374e188a8dc20005752e6c5b580e8316f2323ce7591c\n"}
{"client_time":1731337539,"level":"DEFAULT","message":"Fetching https://xxx.azurewebsites.net/file/thor10.7lite-win-pack_nolic.zip\n"}
{"client_time":1731337539,"level":"DEFAULT","message":"http_client: Downloading https://xxx.azurewebsites.net/file/thor10.7lite-win-pack_nolic.zip into C:\\Program Files\\Velociraptor\\Tools\\tmp1158147984.tmp\n"}
{"client_time":1731337542,"level":"DEFAULT","message":"downloaded hash of C:\\Program Files\\Velociraptor\\Tools\\tmp1158147984.tmp: c1a306af9e9162d14d52374e188a8dc20005752e6c5b580e8316f2323ce7591c, expected c1a306af9e9162d14d52374e188a8dc20005752e6c5b580e8316f2323ce7591c\n"}
{"client_time":1731337542,"level":"DEFAULT","message":"copy: Copying file from C:\\Program Files\\Velociraptor\\Tools\\tmp1158147984.tmp into C:\\Program Files\\Velociraptor\\Tools\\thor10.7lite-win-pack_nolic.zip\n"}
{"client_time":1731337543,"level":"DEFAULT","message":"tempfile: removing tempfile C:\\Program Files\\Velociraptor\\Tools\\tmp1158147984.tmp\n"}
{"client_time":1731337543,"level":"DEFAULT","message":"tempfile: removed tempfile C:\\Program Files\\Velociraptor\\Tools\\tmp1158147984.tmp\n"}
{"client_time":1731337543,"level":"DEFAULT","message":"Adding global destructor for C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\n"}
{"client_time":1731337543,"level":"WARN","message":"Materialize of LET Unzip: Expand larger than 1000 rows, VQL will switch to tempfile backing on C:\\Program Files\\Velociraptor\\Tools\\VQL_Unzip_.jsonl1648725754 which will be much slower.\n"}
{"client_time":1731337544,"level":"DEFAULT","message":"execve: Running external command [[C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\\thor64-lite.exe --json -e C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095] []]\n"}
{"client_time":1731337544,"level":"DEFAULT","message":"execve: exec: \"[C:\\\\Program Files\\\\Velociraptor\\\\Tools\\\\tmp3319932095\\\\thor64-lite.exe --json -e C:\\\\Program Files\\\\Velociraptor\\\\Tools\\\\tmp3319932095]\": executable file not found in %PATH%\n"}
{"client_time":1731337544,"level":"DEFAULT","message":"Generic.Scanner.ThorZIP/ThorExec: Time 0: Generic.Scanner.ThorZIP/ThorExec: Sending response part 0 3 B (1 rows)."}
{"client_time":1731337544,"level":"DEFAULT","message":"read_file: Field filename Expecting a path arg type, not types.Null\n"}
{"client_time":1731337544,"level":"DEFAULT","message":"Generic.Scanner.ThorZIP/ThorExec: Time 0: Generic.Scanner.ThorZIP/ThorResultsJson: Sending response part 0 12 B (1 rows)."}
{"client_time":1731337544,"level":"INFO","message":"Collection Generic.Scanner.ThorZIP/ThorExec is done after 13.4206963s\n"}
{"client_time":1731337544,"level":"DEFAULT","message":"tempfile: removing tempfile C:\\Program Files\\Velociraptor\\Tools\\VQL_Unzip_.jsonl1648725754\n"}
{"client_time":1731337544,"level":"DEFAULT","message":"tempfile: removed tempfile C:\\Program Files\\Velociraptor\\Tools\\VQL_Unzip_.jsonl1648725754\n"}
{"client_time":1731337544,"level":"DEFAULT","message":"RemoveDirectory: removing tempdir C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\n"}
{"client_time":1731337545,"level":"DEFAULT","message":"RemoveDirectory: removed tempdir C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\n"}
{"client_time":1731337545,"level":"DEBUG","message":"Query Stats: {\"RowsScanned\":3061,\"PluginsCalled\":18,\"FunctionsCalled\":9,\"ProtocolSearch\":459,\"ScopeCopy\":6167}\n"}
Could you send us a screenshot of the directory structure inside of that ZIP file? The binary is probably just inside of a sub folder instead of the root folder.
The structure looks okay.
As you can see the problem is that it doesn't find the executable after the extraction
{"client_time":1731337543,"level":"DEFAULT","message":"Adding global destructor for C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\n"}
{"client_time":1731337543,"level":"WARN","message":"Materialize of LET Unzip: Expand larger than 1000 rows, VQL will switch to tempfile backing on C:\\Program Files\\Velociraptor\\Tools\\VQL_Unzip_.jsonl1648725754 which will be much slower.\n"}
{"client_time":1731337544,"level":"DEFAULT","message":"execve: Running external command [[C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\\thor64-lite.exe --json -e C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095] []]\n"}
{"client_time":1731337544,"level":"DEFAULT","message":"execve: exec: \"[C:\\\\Program Files\\\\Velociraptor\\\\Tools\\\\tmp3319932095\\\\thor64-lite.exe --json -e C:\\\\Program Files\\\\Velociraptor\\\\Tools\\\\tmp3319932095]\": executable file not found in %PATH%\n"}
It could be caused by:
AV / EDR
almost full hard disk
Could you verify the SHA256 hash of the ZIP file before you upload it to AWS?
same issue,
Le tme know when you've found the reason.
I have fixed it by changing it to:
LET Exec <= SELECT * FROM execve(argv=[(Executable[0]).F, "--json", "-e", TmpDir])
|
2025-04-01T06:37:18.315096
| 2024-08-11T17:26:59
|
2459686333
|
{
"authors": [
"NamecoinGithub",
"NealHelman",
"S4X1"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2050",
"repo": "Nexusoft/LLL-TAO",
"url": "https://github.com/Nexusoft/LLL-TAO/issues/170"
}
|
gharchive/issue
|
Bootstrap No Longer Available to Download and Unable to Sync from Block 0
The bootstrap is no longer available to download and the protocol is unable to sync from Block 0 without getting stuck on the known block (known issue). @VidereLicet please fix this major issue. We no longer have a way to run a full node making the protocol extremely centralized.
I started looking @ IP's @ the Break, and a Hong Kong Chi-Com IP pops out!
<IP_ADDRESS>
I blocked that IP and tried downloading the Blockchain again, and this time @ start of Sync it seemed to not throw type of Orphan before the other Hard Crash Block, but it usually always heals from restarting the Nexus Client!
I think Hard-code a Geo Block for Hong Kong! Chi-Coms use it as a so called "Democratic" Digital Hub to spread as a Chi-Com Advance Guard! But it's simple to Geo Block all HK as it has it's own Country Code HK, but otherwise I would recommending maybe blocking this Block of IP's! Plus It would be a Revolutionary Act to proactively GEO Block the Chi-Coms who only spread Crime around the World and Drugs using Crypto, there has been nothing positive to ever come out of China in regards to Crypto development! ASIC's will be history as they aren't QUANTUM SECURE~!
Binance is owned by Canadian Born Chi-Com who mastered how the Kosher Bankers Manipulate the System and Setup his Persona as the Hallmark of A+ No Fraud Backup Fund Repair Asian Guy Perfectly!
There is no real Scenario where Nexus Geo Blocking the Chi-Coms could be a bad thing as they provide nothing but wasteful destruction using their Now Privileged Position in the World brought about by Corrupt Elements within the Earth mainly the Kiken Mossad and Vatican once the Jewish Mafias worked out all the Rat Runs for the Chi-Coms to be their Slave labor Engine, to depose the West Morally and Financially dumping the Western Populations in horror of their Porn Capitals Hundred Billion a year Profit Industry @ same time propping up Chi-Com slave labor and Position in the World!
Mostly without a proper Judge upon Earth with enough Power as even now Israel and Russia have both International Arrest Warrants from the UN War Crimes Tribunal but are readily ignored by all the main Actors within each Geo Blocked Sphere the Kosher Bankers have created of the Earth as Sanctions are the Kosher Bankers #1 Tool for Control!
<IP_ADDRESS>
47.75.0/255.0/255
On a more Technical Note with Nexus Development
As far as I know Nexus Tritium can cut off the Blockchain from that fork in 2020! So the Blockchain would be much smaller and start downloading from 2020 or something similar like that!
The main Strategy I think Colin is trying to Solve is using the Old Nexus Bitcoin Code base to Soon have Nexus be able to Import Bitcoin Wallet.dat Files into their Sigchains ect...........and use it as Collateral for NXS/BTC Exchange within the Tritium Nexus GUI
But I think Monero is much better long term Strategy for many reasons, most of which I think it has a lot of Value Creation Compared to Bitcoin's 1.5 Trillion Market Cap Versus Monero 5 Billion Market Cap!
As for this Blockchain Sync Business I am not too worried about it, I could setup my Computer to use Tor Firewall and get it to work, however I don't trust Tor, and Prefer Wireguard Firewall!
I think it will get worked out anyway, the Next Release should be the Hard Fork Release, so it's just a matter of where to place the Hard Fork, but IDK in reality without a lot more discussion!
Either way I think Nexus will as Colin said cut the Old Blockchain Bloat on the Old Code base! That is where this Issue is stemming from on Bitcoin Code Nexus Blocks from 2015, Not the New Tritium Code base just to Clarify! So it will get Resolved 1 way or another!
Bootstrap is now consistently available.
|
2025-04-01T06:37:18.321414
| 2024-05-17T20:28:10
|
2303533120
|
{
"authors": [
"jc21",
"julianq"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2051",
"repo": "NginxProxyManager/nginx-proxy-manager",
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/issues/3762"
}
|
gharchive/issue
|
Very slow loading behind Cloudflare proxy
Checklist
Have you pulled and found the error with jc21/nginx-proxy-manager:latest docker image?
Yes
Are you sure you're not using someone else's docker image?
Yes
Have you searched for similar issues (both open and closed)?
Yes
Describe the bug
Very slow loading times when behind Cloudflare proxy. Not going through Cloudflare proxy works fine. Issue showed up in 2.11.0, as rolling back to 2.10.4 resolves the problem.
Nginx Proxy Manager Version
2.11.0, 2.11.1, 2.11.2
Additional context
May be related to #3365?
As stated on #3365 running this project behind a proxy isn't really its intended purpose. That said, just like any other website, there shouldn't be a problem. Are you proxying to NPM over HTTP or HTTPS?
|
2025-04-01T06:37:18.365522
| 2018-10-16T12:03:50
|
370578217
|
{
"authors": [
"NickeManarin",
"longzheng",
"riverar",
"smaragdus",
"vatterspun"
],
"license": "MS-PL",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2052",
"repo": "NickeManarin/ScreenToGif",
"url": "https://github.com/NickeManarin/ScreenToGif/issues/389"
}
|
gharchive/issue
|
Bundling FFmpeg
I just tried ScreenToGif for the first time and was a bit surprised to see that exporting to MP4 wasn't natively supported. I realized that it supports FFmpeg output, but it requires it to be installed.
I was wondering if there any limitation to bundle FFmpeg as part of ScreenToGif so users don't have to install it separately?
(I guess retain the ability to override the FFmpeg install as an advanced option)
Also noticed that you do have a button to download FFmpeg in the options, but it prompts the user to specify a download location.
Could I suggest if the app is installed, then at least this button by default would save FFmpeg to the installation directory (so it's 1 step less for the user)?
You might also want to do what ShareX has integrated with their software: an auto-download feature. That will maintain a small download size and enable video export for the users that need it.
Alternatively, you might point to one of a number of available open FFMPEG font-ends for a video export tool that works with the amazing number of features built into that tool.
Some possibilities:
FFmpegCatapult: https://github.com/mylesthaiss/FFmpegCatapult
SmartFFmpeg: http://freeware.satria.de/SmartFFmpeg/index.php?lang=EN
WinFF: www.biggmatt.com/winff/
Related thread: #376
Worrying about the size of the program is completely wrong headed. Also, ffmpeg encodes to a mind-boggling number of formats, in various containers, so the "MP4" complaint is wrong.
I searched my machine and it turned out that there are 71 instances of ffmpeg.exe used by various programs- players, converters, video, audio and tag editors, downloaders, catalogs, servers, etc. Most of these programs come with absolute, hard-coded paths to ffmpeg.exe and as a result I have not just multiple instances but also different (in most cases- outdated) versions of ffmpeg.exe. Besides a huge waste of space it is also a huge waste of time to update these instances one by one.
#563
|
2025-04-01T06:37:18.377115
| 2019-04-14T15:11:31
|
432989918
|
{
"authors": [
"NicolasGuilloux",
"dylanmtaylor"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2054",
"repo": "NicolasGuilloux/blade-shadow-beta",
"url": "https://github.com/NicolasGuilloux/blade-shadow-beta/issues/31"
}
|
gharchive/issue
|
Arch version fails to build (includes proposed fix)
As of the new version, I'm having issues installing this on Arch linux via the AUR. I did some digging and discovered that the md5sum changed and the location and name of the .desktop file have also been modified. I was able to get it to build with a few modifications:
The md5sum of the file actually downloaded was d47e22482755a2fc73061860c09d41ac - this might need updated in the source code. If you put this value into PKGBUILD after cloning the repo and run makepkg, it works:
source=('https://shadow.tech/linux/shadow-beta.zip')
md5sums=('d47e22482755a2fc73061860c09d41ac')
The .desktop file, it is actually named shadow-dev.desktop in the new archive so the PKGBUILD script should be updated to reflect this:
### Edit launcher
sed -e 's/^Categories=.*$/Categories=Games;Game;Utility;Virtualization/g' "${pkgdir}/usr/share/applications/shadow-dev.desktop" > shadow-beta.desktop
chmod g-w shadow-beta.desktop
rm "${pkgdir}/usr/share/applications/shadow-dev.desktop"
mv shadow-beta.desktop "${pkgdir}/usr/share/applications/shadow-beta.desktop"
Please update this so that others can benefit :)
AUR package updated, thanks to you :)
|
2025-04-01T06:37:18.381856
| 2016-04-14T18:12:10
|
148440725
|
{
"authors": [
"LMLB",
"NielsLeenheer"
],
"license": "mit",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2055",
"repo": "NielsLeenheer/html5test",
"url": "https://github.com/NielsLeenheer/html5test/issues/432"
}
|
gharchive/issue
|
The "Access the webcam" test is outdated
navigator.getUserMedia is deprecated and was replaced by navigator.mediaDevices.getUserMedia
Fixed
|
2025-04-01T06:37:18.413889
| 2019-03-22T13:04:36
|
424199580
|
{
"authors": [
"NightCatSama",
"Sergey-Ssn"
],
"license": "mit",
"license_source": "bigquery",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2056",
"repo": "NightCatSama/vue-slider-component",
"url": "https://github.com/NightCatSama/vue-slider-component/issues/326"
}
|
gharchive/issue
|
How to disable styles?
Hi,
I want to disable CSS styles plugin, I do not see a way to do it?
What is CSS styles plugin?
What is CSS styles plugin?
vue-slider-component , can I disable styles?
What do you want to do, whether it is a style with the slider disabled or not using the default style of the slider?
not using the default style of the slider https://yadi.sk/i/p0XVuOLLauGBAg
I use my own styles and I don't need to load slider styles doing the double work of overriding css
Version 2.0 is not easy to rewrite styles, you can upgrade to version 3.0.
You can refer https://nightcatsama.github.io/vue-slider-component/#/style
Version 2.0 is not easy to rewrite styles, you can upgrade to version 3.0.
You can refer https://nightcatsama.github.io/vue-slider-component/#/style
Yes version 3 solved my problem, thanks
|
2025-04-01T06:37:18.431448
| 2024-11-05T22:35:25
|
2636608888
|
{
"authors": [
"Nikoloutsos",
"douglasgondim",
"kostasniks"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2057",
"repo": "Nikoloutsos/explicitDependencyImportCheck",
"url": "https://github.com/Nikoloutsos/explicitDependencyImportCheck/issues/2"
}
|
gharchive/issue
|
[Feature] – Return transitive dependencies list in alphabetical order
It would be nice if we had this feature to have consistency in the results.
Yes, we can sort the transitive dependencies alphabetically for same error reporting each time 👍
I am more than welcome if you want to contribute to this repo by creating a PR
Yes, we can sort the transitive dependencies alphabetically for same error reporting each time 👍
I am more than welcome @douglasgondim if you want to contribute to this repo by creating a PR
|
2025-04-01T06:37:18.434296
| 2024-04-17T16:08:50
|
2248679826
|
{
"authors": [
"KlonD90",
"ukorvl"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2058",
"repo": "NilFoundation/ui-kit",
"url": "https://github.com/NilFoundation/ui-kit/pull/278"
}
|
gharchive/pull-request
|
Replace PRIMITIVE_COLORS with COLORS
Replacement of PRIMITIVE_COLORS variable with COLORS to make it shorter and more convenient to use. Name primitive colors makes no since we have no "non-primitive" colors.
It's breaking changes
It should have 3.0 version because it's breaking changes or you should provide backward compatibility
Agree, thanks.
|
2025-04-01T06:37:18.503730
| 2015-10-05T16:12:45
|
109833121
|
{
"authors": [
"Lassulus",
"peti"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2059",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/10240"
}
|
gharchive/issue
|
can't build rss2irc from haskellPackages
nix-env -iA nixos.haskellPackages.rss2irc
output:
Preprocessing executable 'rss2irc' for rss2irc-1.0.6...
Feed.hs:24:8:
Could not find module ‘Network.URI’
It is a member of the hidden package ‘network-uri-<IP_ADDRESS>@netwo_8g2FaihlDOW7yH7DhmRvHt’.
Perhaps you need to add ‘network-uri’ to the build-depends in your .cabal file.
Use -v to see a list of the files searched for.
builder for ‘/nix/store/mw7ai3bngizdcasgajqsdmi22nmyk49s-rss2irc-1.0.6.drv’ failed with exit code 1
It's probably best to report this issue upstream. The package is quite outdated (http://packdeps.haskellers.com/feed?needle=rss2irc) and needs some attention before recent compilers can build it.
|
2025-04-01T06:37:18.514244
| 2021-03-03T16:29:09
|
821271552
|
{
"authors": [
"jtojnar",
"symphorien",
"veprbl",
"xunam"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2060",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/114995"
}
|
gharchive/issue
|
gimp plugin wavelet-sharpen replaces gimp on upgrade
Describe the bug
Using the current unstable channel, if install gimp in my user environment and then do an upgrade, Nix replaces gimp with the wavelet-sharpen plugin and effectively uninstalls gimp itself from the user environment. This does not happen in the stable branch 20.09.
To Reproduce
Here is a transcript of what happens:
$ which gimp
which: no gimp in (/run/wrappers/bin:/home/manu/.nix-profile/bin:/etc/profiles/per-user/manu/bin:/nix/var/nix/profiles/default/bin:/run/current-system/sw/bin)
$ nix-env -iA nixpkgs.gimp
installing 'gimp-2.10.22'
$ which gimp
/home/manu/.nix-profile/bin/gimp
$ nix-env -q | grep gimp
gimp-2.10.22
$ nix-env --upgrade
upgrading 'gimp-2.10.22' to 'gimp-2.10.22-plugin-wavelet-sharpen-0.1.2'
$ which gimp
which: no gimp in (/run/wrappers/bin:/home/manu/.nix-profile/bin:/etc/profiles/per-user/manu/bin:/nix/var/nix/profiles/default/bin:/run/current-system/sw/bin)
$ nix-env -q | grep gimp
gimp-2.10.22-plugin-wavelet-sharpen-0.1.2
$ nix-env --uninstall gimp
uninstalling 'gimp-2.10.22-plugin-wavelet-sharpen-0.1.2'
Expected behavior
I expect gimp to be upgraded.
Apparently, the fact that that gimp-2.10.22-plugin-wavelet-sharpen-0.1.2 contains numbers in the middle is the source of the problem, as if 2.10.22-plugin-wavelet-sharpen-0.1.2 was a version number, and higher than 2.10.22.
Notify maintainers
The gimp package is maintained by @jtojnar, I don't know about the wavelet-sharpen plugin.
Metadata
system: "x86_64-linux"
host os: Linux 5.4.99, NixOS, 20.09.3246.d4189f68fdb (Nightingale)
multi-user?: yes
sandbox: yes
version: nix-env (Nix) 2.3.10
channels(manu): "nixpkgs-21.05pre273332.5df05c902cd"
channels(root): "nixos-20.09.3343.8d82c865b41"
nixpkgs: /home/manu/.nix-defexpr/channels/nixpkgs
Maintainer information:
# a list of nixpkgs attributes affected by the problem
attribute: gimp
# a list of nixos modules affected by the problem
module:
Ugh, I can’t wait for nix-env to be abandoned.
This is a regression caused by https://github.com/NixOS/nixpkgs/commit/ef5475235ce4f3d1405dca5653cbe3599f0ff637 cc @erictapen
On NixOS you probably shouldn't use nix-env at all (use configuration.nix or home-manager instead) and documentation should not encourage to use it imo: https://github.com/NixOS/nixos-homepage/issues/672
I'm all for using the declarative approach to handle user packages, and actually my current setup consists mostly in defining an environment with buildEnv in ~/.config/nixpkgs/config.nix with the packages I want. However I find the stateful system of nix-env to be a useful middle-ground between full declarative and using nix-shell for short-term usage of specific packages.
As a side note, Gimp ended up installed through nix-env instead of config*.nix because of space constraints. On a system with a few gigabytes of storage allocated for /nix/store, upgrading a whole system with several big packages (e.g. Gimp, TeXlive, Haskell and other things) becomes a problem because you must have two versions of each present at the same time before you can switch to the new generation and garbage-collect the old one. At least, with nix-env, you can uninstall those, collect garbage, upgrade and then install them back without having to hack on your declarative configuration.
As for Home Manager, I admit I am reluctant to make the switch from my years-old tuned and portable home configuration as long as the first words of its documentation are a big warning on the fact that it may break things.
Ugh, I can’t wait for nix-env to be abandoned.
To be fair, we would need to also get rid of this behaviour:
nix-repl> builtins.parseDrvName "gimp-2.10.22-plugin-wavelet-sharpen-0.1.2"
{ name = "gimp"; version = "2.10.22-plugin-wavelet-sharpen-0.1.2"; }
Yes, I would kill parseDrvName too, if I could.
|
2025-04-01T06:37:18.519851
| 2021-09-07T08:53:31
|
989750919
|
{
"authors": [
"Kreyren",
"bjornfor",
"legendofmiracles",
"roberth"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2061",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/136972"
}
|
gharchive/issue
|
Q: How can i write an output of a command to file using nixlang?
I want to create a file with the content from stdout of command openssl rand -hex 64 to be provided to services.discourse.secretKeyBaseFile
How can i do that in a reproducible way assuming that the current way is do a build with services.discourse.secretKeyBaseFile = "/run/keys/secret_key_base" and after build do manually openssl rand -hex 64 > /run/keys/secret_key_base && chown discourse:discourse /run/keys/secret_key_base && chmod 440 /run/keys/secret_key_base ?
If you use nixlang I think the secret will end up in the nix store (not so secret). I would write a systemd service for your openssl commands that creates the /run/keys/secret_key_base file at runtime, and makes the discourse service wait for that file.
@bjornfor I rather want to handle it through nixlang where the theory is:
services.discourse.secretKeyBaseFile = pkgs.writeFile "/run/keys/secret_key_base" ''
${generateTheString}
'';
Where i don't know how could i do the ${generateTheString}
Probably something like reading /dev/random ?
[kreyren@leonid:~]$ head -n1 /dev/random
:#0��Ǟ0�PXn�����t�����gn�p(o�V�+�>g�<̻�Jсo�ԟ�ڀ4 {�I��_f���<�{
runCommand and friends can write data to the nix store, from a shell script. See here: https://nixos.org/manual/nixpkgs/stable/#trivial-builder-runCommand
@legendofmiracles I want that outside of nix store, because it's a secret.. Which i assume is not possible?
You could use nix-instantiate --eval --strict to get Nix values without necessarily writing them to the store. It's what NixOps uses for its keys (secrets) feature. It even has a resources to generate an ssh key and store it in the NixOps state, or do the same for an arbitrary command on the deployer's machine. Sadly, we don't have generated docs for NixOps 2 at the moment, but you can find the option descriptions for these resources here: https://github.com/NixOS/nixops/tree/master/nix
|
2025-04-01T06:37:18.526590
| 2022-03-29T11:12:26
|
1184699524
|
{
"authors": [
"I-Want-ToBelieve",
"cafkafk",
"koppor",
"pbsds"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2062",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/166228"
}
|
gharchive/issue
|
Packaging request: normcap
Project description
OCR-powered screenshot tool to capture text instead of images.
Metadata
homepage URL: https://dynobo.github.io/normcap/
source URL: https://github.com/dynobo/normcap
license: GPL3
platforms: unix
example package: AUR (PKGBUILD)
I started working on this but I'm stuck at how to package with qt
This seems to be a poetry-based project, meaning you should set format="pyproject" and add poetry-core as a nativeBuildInput. If adding the python qt libraries is not sufficient, then try using the hooks for Qt applications.
https://github.com/nix-community/nur-combined/blob/6bddae47680482383b5769dd3aa7d82b88e6cbc8/repos/renesat/pkgs/normcap/default.nix#L42
I'll try to make a PR with this, ty
Is it possible that normcap causes issues in recent NixOS?
error: builder for '/nix/store/zk4imnx8zyibcghr5lriq31rwsyzcpvn-normcap-0.5.4.drv' failed with exit code 1;
last 10 log lines:
> =========================== short test summary info ============================
> FAILED tests/test_app.py::test_get_application - RuntimeError: Please destroy the QApplication singleton before creating a n...
> FAILED tests/tests_gui/test_loading_indicator.py::test_radius - AttributeError: 'LoadingIndicator' object has no attribute 'timer'
> FAILED tests/tests_gui/test_loading_indicator.py::test_opacities - AttributeError: 'LoadingIndicator' object has no attribute 'timer'
> FAILED tests/tests_gui/test_loading_indicator.py::test_show_starts_timer - AttributeError: 'LoadingIndicator' object has no attribute 'timer'
> FAILED tests/tests_gui/test_loading_indicator.py::test_hide_stops_timer - AttributeError: 'LoadingIndicator' object has no attribute 'timer'
> FAILED tests/tests_gui/test_loading_indicator.py::test_frame_count_progresses - AttributeError: 'LoadingIndicator' object has no attribute 'timer'
> FAILED tests/tests_gui/test_loading_indicator.py::test_circles_are_rendered - AttributeError: 'LoadingIndicator' object has no attribute 'timer'
> ==== 7 failed, 297 passed, 15 skipped, 21 deselected, 13 warnings in 5.69s =====
> /nix/store/9wnvhjyxjykwn5y06xc9a2h8rs5fbfia-stdenv-linux/setup: line 1579: pop_var_context: head of shell_variables not a function context
For full logs, run 'nix log /nix/store/zk4imnx8zyibcghr5lriq31rwsyzcpvn-normcap-0.5.4.drv'.
error: 1 dependencies of derivation '/nix/store/2pvf5yvj6qi68k6hzlp6s3pjab7m09m5-home-manager-path.drv' failed to build
error: 1 dependencies of derivation '/nix/store/mja27h5nbrcn4m82rb2mc972sxr625bp-home-manager-generation.drv' failed to build
error: 1 dependencies of derivation '/nix/store/2wxil3bbrlk02vkg8qvwgr56q7i936q7-user-environment.drv' failed to build
error: 1 dependencies of derivation '/nix/store/wib7xmij8pai67c6mvdvcplzqkl797n5-etc.drv' failed to build
error: 1 dependencies of derivation '/nix/store/lbcml8mj88hiv0s2glv86ks2gm5lbr29-nixos-system-nixos-24.05.20240421.6143fc5.drv' failed to build
> nix-shell -p nix-info --run "nix-info -m"
- system: `"x86_64-linux"`
- host os: `Linux 6.6.21, NixOS, 24.05 (Uakari), 24.05.20240312.0ad13a6`
- multi-user?: `yes`
- sandbox: `yes`
- version: `nix-env (Nix) 2.18.1`
- channels(root): `"nixos-23.11, unstable"`
- nixpkgs: `/nix/store/k5l01g2zwhysjyl5zjvg5zxnj0lyxpp1-source`
Fixed by https://github.com/NixOS/nixpkgs/pull/305822 which reaches unstable in a few fays
|
2025-04-01T06:37:18.535045
| 2022-10-31T14:33:00
|
1429948521
|
{
"authors": [
"Atemu",
"gador",
"hvraven"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2063",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/198787"
}
|
gharchive/issue
|
paperless-ngx pdf import not working
Describe the bug
Using unstable paperless-ngx-1.9.2 (on a 22.05 system) I am no longer able to import documents from the web interface as they fail with a MissingDependencyError in unpaper. Sadly parts of the error log appear to be missing, I am not sure how to get the full output.
Steps To Reproduce
Steps to reproduce the behavior:
Configure service.paperless with package = pkgs.unstable.paperless-ngx
Import document from the web interface
Expected behavior
Document should be processed and show up in the document list
Log
Oct 31 15:24:42 nixos paperless-ngx[38670]: [2022-10-31 14:24:42,168] [ERROR] [paperless.consumer] Error while consuming document censored-document-name.pdf: MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error:
Oct 31 15:24:42 nixos paperless-ngx[38670]: Traceback (most recent call last):
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 157, in get_version
Oct 31 15:24:42 nixos paperless-ngx[38670]: proc = run(
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 58, in run
Oct 31 15:24:42 nixos paperless-ngx[38670]: proc = subprocess_run(args, env=env, check=check, **kwargs)
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/fkcl1wzq3106qqgl84bhgk1lp56q6bzg-python3-3.10.7/lib/python3.10/subprocess.py", line 524, in run
Oct 31 15:24:42 nixos paperless-ngx[38670]: raise CalledProcessError(retcode, process.args,
Oct 31 15:24:42 nixos paperless-ngx[38670]: subprocess.CalledProcessError: Command '['/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper', '--version']' died with <Signals.SIGSYS: 31>.
Oct 31 15:24:42 nixos paperless-ngx[38670]: The above exception was the direct cause of the following exception:
Oct 31 15:24:42 nixos paperless-ngx[38670]: Traceback (most recent call last):
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/paperless_tesseract/parsers.py", line 277, in parse
Oct 31 15:24:42 nixos paperless-ngx[38670]: ocrmypdf.ocr(**args)
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/api.py", line 339, in ocr
Oct 31 15:24:42 nixos paperless-ngx[38670]: check_options(options, plugin_manager)
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 245, in check_options
Oct 31 15:24:42 nixos paperless-ngx[38670]: _check_plugin_invariant_options(options)
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 232, in _check_plugin_invariant_options
Oct 31 15:24:42 nixos paperless-ngx[38670]: check_options_preprocessing(options)
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 132, in check_options_preprocessing
Oct 31 15:24:42 nixos paperless-ngx[38670]: check_external_program(
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 331, in check_external_program
Oct 31 15:24:42 nixos paperless-ngx[38670]: found_version = version_checker()
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_exec/unpaper.py", line 69, in version
Oct 31 15:24:42 nixos paperless-ngx[38670]: return get_version('/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper')
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 173, in get_version
Oct 31 15:24:42 nixos paperless-ngx[38670]: raise MissingDependencyError(
Oct 31 15:24:42 nixos paperless-ngx[38670]: ocrmypdf.exceptions.MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error:
Oct 31 15:24:42 nixos paperless-ngx[38670]: The above exception was the direct cause of the following exception:
Oct 31 15:24:42 nixos paperless-ngx[38670]: Traceback (most recent call last):
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/documents/consumer.py", line 320, in try_consume_file
Oct 31 15:24:42 nixos paperless-ngx[38670]: document_parser.parse(self.path, mime_type, self.filename)
Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/paperless_tesseract/parsers.py", line 333, in parse
Oct 31 15:24:42 nixos paperless-ngx[38670]: raise ParseError(f"{e.__class__.__name__}: {str(e)}") from e
Oct 31 15:24:42 nixos paperless-ngx[38670]: documents.parsers.ParseError: MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error:
Oct 31 15:24:42 nixos paperless-ngx[38670]: 14:24:42 [Q] INFO Process-1:4 stopped doing work
Oct 31 15:24:42 nixos paperless-ngx[38596]: 14:24:42 [Q] ERROR Failed [censored-document-name.pdf] - censored-document-name.pdf: Error while consuming document censored-document-name.pdf: MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error:
Oct 31 15:24:42 nixos paperless-ngx[38596]: : Traceback (most recent call last):
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 157, in get_version
Oct 31 15:24:42 nixos paperless-ngx[38596]: proc = run(
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 58, in run
Oct 31 15:24:42 nixos paperless-ngx[38596]: proc = subprocess_run(args, env=env, check=check, **kwargs)
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/fkcl1wzq3106qqgl84bhgk1lp56q6bzg-python3-3.10.7/lib/python3.10/subprocess.py", line 524, in run
Oct 31 15:24:42 nixos paperless-ngx[38596]: raise CalledProcessError(retcode, process.args,
Oct 31 15:24:42 nixos paperless-ngx[38596]: subprocess.CalledProcessError: Command '['/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper', '--version']' died with <Signals.SIGSYS: 31>.
Oct 31 15:24:42 nixos paperless-ngx[38596]: The above exception was the direct cause of the following exception:
Oct 31 15:24:42 nixos paperless-ngx[38596]: Traceback (most recent call last):
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/paperless_tesseract/parsers.py", line 277, in parse
Oct 31 15:24:42 nixos paperless-ngx[38596]: ocrmypdf.ocr(**args)
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/api.py", line 339, in ocr
Oct 31 15:24:42 nixos paperless-ngx[38596]: check_options(options, plugin_manager)
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 245, in check_options
Oct 31 15:24:42 nixos paperless-ngx[38596]: _check_plugin_invariant_options(options)
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 232, in _check_plugin_invariant_options
Oct 31 15:24:42 nixos paperless-ngx[38596]: check_options_preprocessing(options)
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 132, in check_options_preprocessing
Oct 31 15:24:42 nixos paperless-ngx[38596]: check_external_program(
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 331, in check_external_program
Oct 31 15:24:42 nixos paperless-ngx[38596]: found_version = version_checker()
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_exec/unpaper.py", line 69, in version
Oct 31 15:24:42 nixos paperless-ngx[38596]: return get_version('/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper')
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 173, in get_version
Oct 31 15:24:42 nixos paperless-ngx[38596]: raise MissingDependencyError(
Oct 31 15:24:42 nixos paperless-ngx[38596]: ocrmypdf.exceptions.MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error:
Oct 31 15:24:42 nixos paperless-ngx[38596]: The above exception was the direct cause of the following exception:
Oct 31 15:24:42 nixos paperless-ngx[38596]: Traceback (most recent call last):
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/28535xrr4xv02r0xlq6b5k9gqy96d9cq-python3.10-asgiref-3.5.2/lib/python3.10/site-packages/asgiref/sync.py", line 280, in main_wrap
Oct 31 15:24:42 nixos paperless-ngx[38596]: raise exc_info[1]
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/documents/consumer.py", line 320, in try_consume_file
Oct 31 15:24:42 nixos paperless-ngx[38596]: document_parser.parse(self.path, mime_type, self.filename)
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/paperless_tesseract/parsers.py", line 333, in parse
Oct 31 15:24:42 nixos paperless-ngx[38596]: raise ParseError(f"{e.__class__.__name__}: {str(e)}") from e
Oct 31 15:24:42 nixos paperless-ngx[38596]: documents.parsers.ParseError: MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error:
Oct 31 15:24:42 nixos paperless-ngx[38596]: The above exception was the direct cause of the following exception:
Oct 31 15:24:42 nixos paperless-ngx[38596]: Traceback (most recent call last):
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/0lg74rgck6skkf4p14ivqsk1nb60d5ck-python3.10-django-q-1.3.9/lib/python3.10/site-packages/django_q/cluster.py", line 454, in worker
Oct 31 15:24:42 nixos paperless-ngx[38596]: res = f(*task["args"], **task["kwargs"])
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/documents/tasks.py", line 154, in consume_file
Oct 31 15:24:42 nixos paperless-ngx[38596]: document = Consumer().try_consume_file(
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/documents/consumer.py", line 339, in try_consume_file
Oct 31 15:24:42 nixos paperless-ngx[38596]: self._fail(
Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/documents/consumer.py", line 90, in _fail
Oct 31 15:24:42 nixos paperless-ngx[38596]: raise ConsumerError(f"{self.filename}: {log_message or message}") from exception
Oct 31 15:24:42 nixos paperless-ngx[38596]: documents.consumer.ConsumerError: censored-document-name.pdf: Error while consuming document censored-document-name.pdf: MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error:
Oct 31 15:24:43 nixos paperless-ngx[38594]: 14:24:43 [Q] INFO recycled worker Process-1:4
Oct 31 15:24:43 nixos paperless-ngx[38685]: 14:24:43 [Q] INFO Process-1:5 ready for work at 38685
Notify maintainers
@lukegb, @gador, @erikarvstedt
Metadata
[user@system:~]$ nix-shell -p nix-info --run "nix-info -m"
- system: `"x86_64-linux"`
- host os: `Linux 5.15.74, NixOS, 22.05 (Quokka), 22.05.3900.26eb67abc9a`
- multi-user?: `yes`
- sandbox: `yes`
- version: `nix-env (Nix) 2.8.1`
- channels(hendrik): `""`
- channels(root): `"nixos-22.05, nixos-hardware, nixpkgs-unstable"`
- nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos`
I just tested it on the current master as well as nixos-unstable. Both work just fine.
I suspect it has something to do with you runnung 22.05 and using a package from the unstable branch. I've seen weird errors when mixing those (e.g. with pgadmin here).
@hvraven is this still an issue?
Swapping out the executable with one from a different release is not supported.
|
2025-04-01T06:37:18.541937
| 2016-12-10T09:31:04
|
194755925
|
{
"authors": [
"joachifm",
"tohl",
"unlmtd"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2064",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/21038"
}
|
gharchive/issue
|
Cjdns can't create keys in /etc
Issue description
With cjdns enabled, the service complains that it can't create the necessary
keys in /etc
/nix/store/9ms47qxfd0qrxn4s689m9pbdrds57d59-unit-script/bin/cjdns-pre-start: line 9: /etc/cjdns.keys: Read-only file system
Steps to reproduce
services.cjdns.enable = true;
Technical details
System: 17.03pre96925.1c50bdd (Gorilla)
Nix version: 1.11.4
Nixpkgs version: 17.03pre96925.1c50bdd
This seems to be the relevant part in nixpkgs/nixos/modules/services/networking/cjdns.nix
preStart = if cfg.confFile != null then "" else ''
[ -e /etc/cjdns.keys ] && source /etc/cjdns.keys
if [ -z "$CJDNS_PRIVATE_KEY" ]; then
shopt -s lastpipe
${pkg}/bin/makekeys | { read private ipv6 public; }
umask 0077
echo "CJDNS_PRIVATE_KEY=$private" >> /etc/cjdns.keys
echo -e "CJDNS_IPV6=$ipv6\nCJDNS_PUBLIC_KEY=$public" > /etc/cjdns.public
chmod 600 /etc/cjdns.keys
chmod 444 /etc/cjdns.public
fi
if [ -z "$CJDNS_ADMIN_PASSWORD" ]; then
echo "CJDNS_ADMIN_PASSWORD=$(tr -dc A-Za-z0-9 </dev/urandom | head -c 96)" \
>> /etc/cjdns.keys
fi
'';
What would be the Nixos way here?
Yes, it's because the "hardening" is too zealous, it needs to let preStart run as root (or not run with ProtectSystem = full or whatever)
@unlmtd can you try something like services.cjdns.serviceConfig.PermissionsStartOnly = true?
nixos-rebuild says that option doesnt exist
Agh, sorry, that should be systemd.services.cjdns.serviceConfig
That didn't do it, Im getting the same error.
Hm, I guess it doesn't pertain to fs isolation options; then you need to change ProtectSystem = "full" to true (or false).
ProtectSystem = "full" prevents writing the keys (/etc is read-only).
pre-start should be refactored to a separate systemd service without
that restriction, and cjdns run with that restriction in another
service.
This should be fixed by a0338afe5faa9f9e403e2caa52e4a8b60c272be9. A better fix is at https://github.com/joachifm/nixpkgs/tree/cjdns-init-keys but is not very well tested.
|
2025-04-01T06:37:18.547634
| 2017-05-24T09:50:15
|
230982325
|
{
"authors": [
"andyjscott",
"edolstra",
"romildo"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2065",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/26052"
}
|
gharchive/issue
|
With mlocate normal users cannot access /var/cache
Issue description
After switching from the default locate package to mlocate, normal users cannot access /var/cache anymore:
$ locate vertical-dark-opaque.tint2rc
locate: can not open `/var/cache/locatedb': Permission denied
$ ls -l /var | grep cache
drwxr-x--- 4 root mlocate 4096 May 21 12:01 cache
My configuration.nix has the following:
services.locate = {
enable = true;
prunePaths = [ "/tmp" "/var/cache" "/var/lock" "/var/run" "/var/spool" ];
interval = "hourly";
locate = pkgs.mlocate;
};
Technical details
System: 17.09pre107265.0afb6d789c (Hummingbird)
Nix version: nix-env (Nix) 1.11.9
Nixpkgs version: "17.09pre107265.0afb6d789c"
Sandboxing enabled: build-use-sandbox = false
cc @pngwjpgh @andyjscott
More information:
# systemctl status update-locatedb
● update-locatedb.service - Update Locate Database
Loaded: loaded (/nix/store/hvppx691rlm50drqmy3bbxgbihqacd20-unit-update-locatedb.service/update-locatedb.service; linked; vendor preset: enabled)
Active: failed (Result: exit-code) since Wed 2017-05-24 06:00:01 BRT; 57min ago
Process: 13268 ExecStart=/nix/store/mhwn1prj1vbn9lqqq2rxin2b8761y569-unit-script/bin/update-locatedb-start (code=exited, status=1/FAILURE)
Main PID: 13268 (code=exited, status=1/FAILURE)
May 24 06:00:00 jrm.no-ip.org systemd[1]: Started Update Locate Database.
May 24 06:00:01 jrm.no-ip.org update-locatedb-start[13268]: /nix/store/j96vg63fm5v7kxfg308q99jasx40f05h-mlocate-0.26/bin/updatedb: unrecognized option '--localuser=nobody'
May 24 06:00:01 jrm.no-ip.org systemd[1]: update-locatedb.service: Main process exited, code=exited, status=1/FAILURE
May 24 06:00:01 jrm.no-ip.org systemd[1]: update-locatedb.service: Unit entered failed state.
May 24 06:00:01 jrm.no-ip.org systemd[1]: update-locatedb.service: Failed with result 'exit-code'.
This is caused by
install -m ${if isMLocate then "0750" else "0755"} -o root -g ${if isMLocate then "mlocate" else "root"} -d $(dirname ${cfg.output})
This line should be replaced by
mkdir -m 0755 -p /var/cache
and the cfg.output option should be removed since there is really no reason to make that path configurable.
It looks like localuser = null; should also be set for mlocate due to the failure message:
... mlocate-0.26/bin/updatedb: unrecognized option '--localuser=nobody'
Currently a warning is shown but it should probably be an error as it breaks the update service.
|
2025-04-01T06:37:18.550769
| 2024-04-28T22:43:06
|
2267857644
|
{
"authors": [
"eclairevoyant",
"mwalid207"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2066",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/307574"
}
|
gharchive/issue
|
Package request: ondsel
Project description
Metadata
homepage URL: https://ondsel.com/
source URL:
license: mit, bsd, gpl2+ , ...
platforms: unix, linux, darwin, ...
Add a :+1: reaction to issues you find important.
duplicate of #284524
|
2025-04-01T06:37:18.556882
| 2017-11-04T21:42:52
|
271228694
|
{
"authors": [
"5paceToast",
"IvanMalison",
"brainrape",
"joncojonathan"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2067",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/31261"
}
|
gharchive/issue
|
Keybase GUI shouldn't check hardcoded /keybase mountpoint
Issue description
The keybase-gui wrapper checks for a hardcoded value to see if kbfs is mounted there.
However, this is configurable through the kbfs service, and defaults to ~/keybase.
The wrapper should either be hard-coded to whatever options.services.kbfs.mountPoint is, or verify the status some other way (e.g calling keybase status).
Steps to reproduce
Set the following in configuration.nixservices.keybase.enable = true;
services.kbfs.enable = true;
nix-env -iA nixos.keybase-gui
rebuild your configuration
try to launch keybase-gui
Expected behavior
Tests pass and keybase-gui launches.
Actual behavior
Keybase is not mounted to /keybase.
You might need to run: kbfsfuse /keybase
Set NIX_SKIP_KEYBASE_CHECKS=1 if you want to skip this check.
Technical details
System: 18.03pre119292.cfafd6f5a8 (Impala)
Nix version: 1.11.15
Nixpkgs version: 18.03pre119292.cfafd6f5a8
Sandboxing enabled: false
^ added hardcoded ~/keybase
Hi @brainrape ,
While this does look like it'll work in most scenarios it doesn't solve the overall problem in #31261 as it's now just looking at two options of hardcoded mountpoint. A better solution would be to have the wrapper (I may have used the wrong word, if so, sorry) check for where keybase is mounted and then use that.
Are we not able to do that instead?
Updated PR with suggested fix.
@brainrape status?
Waiting for merge. @ mentioned maintainer.
|
2025-04-01T06:37:18.561726
| 2024-06-08T19:10:49
|
2341790926
|
{
"authors": [
"Henry-Hiles",
"RossComputerGuy"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2068",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/318344"
}
|
gharchive/issue
|
Update request: flutter 3.22.0 → 3.22.2
Package name: flutter
Latest released version: 3.22.2
Current version on the unstable channel: 3.22.0
Current version on the stable/release channel: 3.22.0
[x] Checked the nixpkgs pull requests
Notify maintainers
@NixOS/flutter
Note for maintainers: Please tag this issue in your PR.
Add a :+1: reaction to issues you find important.
I can get this later today
I can get this later today
Thank you!
@Henry-Hiles #318396
I'll test that tomorrow thanks!
|
2025-04-01T06:37:18.584236
| 2018-02-23T18:56:06
|
299814629
|
{
"authors": [
"7c6f434c",
"LnL7",
"MP2E",
"Mic92",
"dtzWill",
"fpletz",
"orivej",
"sjau"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2069",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/35415"
}
|
gharchive/issue
|
tmux "crashes???" when konsole tab is closed
Issue description
I've been using Konsole for years and it works great with tmux. However since a few days ago on unstable small, when I close a Konsole tab, the tmux session "in that tab" gets killed/stopped or whatever....
Steps to reproduce
Use nixos-uunstable-small
Open Konsole
SSH into server
Start TMUX session
Right-click the konsole server tab and close it
Open new tap, ssh into same server again
Try to attach tmux
--> https://youtu.be/-hXLPQfoI70
This has been happening not longer than 2 weeks I think... maybe even less than 1 week - not sure how long but not very long.
Technical details
Please run nix-shell -p nix-info --run "nix-info -m" and paste the
results.
system: "x86_64-linux"
host os: Linux 4.14.21, NixOS, 18.03pre129183.a3c96fd4de3 (Impala)
multi-user?: yes
sandbox: no
version: nix-env (Nix) 1.11.16
channels(hyper): ""
channels(root): "nixos-18.03pre129183.a3c96fd4de3"
nixpkgs: /nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs
Ok, I tested this on another server - same behaviour:
system: "x86_64-linux"
host os: Linux 4.9.81, NixOS, 18.03pre128357.327a84749ed (Impala)
multi-user?: yes
sandbox: no
version: nix-env (Nix) 1.11.16
channels(root): "nixos-18.03pre128357.327a84749ed"
nixpkgs: /nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs
If I do this on a non-nixos server it all works fine.
I tested on a third server - this time I get the expected behaviour:
system: "x86_64-linux"
host os: Linux 4.9.75, NixOS, 18.03pre124914.b9806751074 (Impala)
multi-user?: yes
sandbox: no
version: nix-env (Nix) 1.11.16
channels(root): "nixos-18.03pre124914.b9806751074"
nixpkgs: /nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs
(so all works fine here)
Git bisect blames 672bb6b4abd27d9b2796152522b54f5b82c9f76b, I don't really see anything suspicious in there.
@LnL7 can you track this down with sysdig?
I'm not sure how much time I'll have this weekend, it's pretty easy to reproduce if anybody else wants to take a shot at it. Tmux will die when the ssh connection closes.
{ config, lib, pkgs, ... }:
{
services.mingetty.autologinUser = "root";
virtualisation.graphics = false;
users.users.foo = {
uid = 1000;
group = "foo";
isNormalUser = true;
openssh.authorizedKeys.keys = [ "..." ];
};
users.groups.foo = { gid = 1000; };
environment.systemPackages = [ pkgs.tmux ];
services.openssh.enable = true;
}
export QEMU_NET_OPTS="hostfwd=tcp::3000-:22"
nixos-rebuild build-vm -I nixos-config=foo.nix -I nixpkgs=.
./result/bin/run-nixos-vm
ssh -i ./foo_rsa -p 3000<EMAIL_ADDRESS>
Git bisect blames 672bb6b4abd27d9b2796152522b54f5b82c9f76b, but I don't really see anything suspicious in there.
One thing that may be related is that it brings 1de98e85681e7d1028fe866fa220c05ce1ed842f, "plasma: 5.11.5 -> 5.12.1".
@LnL7 ah now, this is a different one.
I've seen that issue with nix-build, tmux works fine it uses /tmp/tmux-$UID for the socket.
@Mic92
I experience this via ssh.... I tested it on 3 nixos servers... the 2 newer ones have that isse, an older one doesn't. Also non-nixos server don't have that issue either.
I'm affected by this issue as well, except I'm using rxvt-unicode as the terminal
Btw, it only happens if I start tmux as normal user. When I login by ssh as root user, start tmux, close the konsole tab and re-login, the tmux session is still running
This can be fixed by doing loginctl enable-linger $USER, where $USER is your user.
enable-linger does not change the behaviour.
Note that there's also nothing systemd related in bad commit git bisect ended up in.
I also tested it and the offending comit that I found was
f5e96d3e1b7 xz: set CONFIG_SHELL to /bin/sh, fix retained reference to bootstrap
I tested it now also on a live server - reverting back to commit 122fa75b2de619ceace4b94a613683e54c34ddd0 makes tmux run properly again.
Ok, it might not be that commit as I used
git log --oneline b9806751074..327a84749ed
and those two commits are adjacent
Maybe both enabling lingering and using systemd-run is needed?
cc https://github.com/NixOS/nixpkgs/issues/15798#issuecomment-222352494
Hmm, I tried this but it failed to start due to permissions?
Feb 26 05:52:42 gravity polkitd[8886]: Registered Authentication Agent for unix-process:9169:30559097 (system bus name :1.31 [/run/current-system/sw/bin/pkttyagent --notify-fd 5 --fallback], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8)
Feb 26 05:52:42 gravity systemd[5382]: run-rff29cc1b2fea4c84ad8787b5f7c40649.scope: Failed to add PIDs to scope's control group: Permission denied
Feb 26 05:52:42 gravity systemd[5382]: run-rff29cc1b2fea4c84ad8787b5f7c40649.scope: Failed with result 'resources'.
Feb 26 05:52:42 gravity systemd[5382]: Failed to start /run/current-system/sw/bin/screen hydra.
Perhaps related: https://bbs.archlinux.org/viewtopic.php?id=227953
Is this really desirable default behavior? If so, should probably be mentioned in release notes....
From https://bbs.archlinux.org/viewtopic.php?pid=1724323#p1724323 possible hint:
Ok, it seems that the distro package maintainer enabled systemd hybrid cgroup without kernel support.
Or maybe -Ddefault-kill-user-processes=false? It does seem rather hostile default behavior.
@dtzWill long long time ago, when this specific crazy change in systemd started affecting NixOS, we did add KillUserProcesses=no into logind.conf and never removed it. Because the default systemd behaviour is indeed hostile to any user who has a chance to install NixOS on their own.
Oh, well hooray for that ^_^. Good to know.
Chasing that:
$ find -L /run/current-system -name "logind.conf"
/run/current-system/etc/systemd/logind.conf
/run/current-system/systemd/etc/systemd/logind.conf
One of which sets KillUserProcesses=no nicely and the other does not. Hopefully/presumably the other is just an example/dead-end. Hmm.
Erm, maybe this is the problem? Poking at loginctl to try to see what it is reading from or what config it ends up with led me to try:
$ loginctl -p KillUserProcesses show-session
KillUserProcesses=yes
(I'm not a systemd expert, can someone take a look? Thanks!)
@dtzWill Thanks for the debugging. This is probably a regression due to the recent systemd update. I can confirm that I have KillUserProcesses=no in /etc/systemd/logind.conf but loginctl -p KillUserProcesses show-session will print KillUserProcesses=yes.
@fpletz @dtzWill I looked into that using sysdig it only tries to read ${pkgs.systemd}/etc/systemd/logind.conf, but not /etc/systemd/logind.conf. That's why configuration is never applied.
I made a pull request to our systemd fork that fixes the issue.
|
2025-04-01T06:37:18.591604
| 2020-12-10T13:07:00
|
761225912
|
{
"authors": [
"kfollesdal",
"nixos-discourse"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2070",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/106551"
}
|
gharchive/pull-request
|
bumpver: 2020.1107 -> 2020.1108
Motivation for this change
Update bumpver to last version
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[ ] NixOS
[ ] macOS
[x] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[x] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 106551 1
1 package built:
bumpver
This pull request has been mentioned on NixOS Discourse. There might be relevant details there:
https://discourse.nixos.org/t/prs-ready-for-review/3032/405
|
2025-04-01T06:37:18.599387
| 2021-01-23T17:52:11
|
792616001
|
{
"authors": [
"cpcloud"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2071",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/110614"
}
|
gharchive/pull-request
|
nixos/nomad: fix data_dir-default-not-propagating bug
nixos/nomad: add newline
nixos/nomad: move data_dir default setting to allow propagation of default
Motivation for this change
The value of data_dir in the nomad module was only
set to its default if settings was not overridden at all.
This PR fixes the issue so that you can override settings
without having to specify the default value of data_dir.
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[x] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[x] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
Once https://github.com/NixOS/nixpkgs/pull/109761 is landed I will update the test here by removing the explicit data_dir setting.
Once https://github.com/NixOS/nixpkgs/pull/109761 is landed I will update the test here by removing the explicit data_dir setting.
Thanks for merging!
Thanks for merging!
|
2025-04-01T06:37:18.604173
| 2021-02-07T15:50:19
|
802983934
|
{
"authors": [
"r-rmcgibbo",
"spacefrogg"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2072",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/112309"
}
|
gharchive/pull-request
|
sharness: Init at 1.1.0-dev
Motivation for this change
A simple portable shell library to write and run tests adhering to the Test Anything Protocol.
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[x] Determined the impact on package closure size (by running nix path-info -S before and after)
[x] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
Updated.
Result of nixpkgs-review pr 112309 at 44b06c61 run on aarch64-linux 1
1 package built:
sharness
|
2025-04-01T06:37:18.615808
| 2021-02-17T18:46:49
|
810442813
|
{
"authors": [
"r-rmcgibbo",
"r-ryantm"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2073",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/113482"
}
|
gharchive/pull-request
|
python37Packages.django-auth-ldap: 2.2.0 -> 2.3.0
Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript.
meta.description for python37Packages.django-auth-ldap is: "Django authentication backend that authenticates against an LDAP service"
meta.homepage for python37Packages.django-auth-ldap is: "https://github.com/django-auth-ldap/django-auth-ldap"
meta.changelog for python37Packages.django-auth-ldap is: ""
Updates performed
Ran passthru.UpdateScript
To inspect upstream changes
Impact
Checks done (click to expand)
built on NixOS
Warning: a test defined in passthru.tests did not pass
0 of 0 passed binary check by having a zero exit code.
0 of 0 passed binary check by having the new version present in output.
found 2.3.0 with grep in /nix/store/zlh1jxl5jky18vsnb6qcfcmzd9wdjiy8-python3.7-django-auth-ldap-2.3.0
directory tree listing: https://gist.github.com/7bf054df94955bd3decdb01135a3d207
du listing: https://gist.github.com/a1e51bef52b9f35a33d7a8dbbc37e91b
Rebuild report (if merged into master) (click to expand)
9 total rebuild path(s)
3 package rebuild(s)
3 x86_64-linux rebuild(s)
3 i686-linux rebuild(s)
0 x86_64-darwin rebuild(s)
3 aarch64-linux rebuild(s)
First fifty rebuilds by attrpath
python37Packages.django-auth-ldap
python38Packages.django-auth-ldap
python39Packages.django-auth-ldap
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/zlh1jxl5jky18vsnb6qcfcmzd9wdjiy8-python3.7-django-auth-ldap-2.3.0 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A python37Packages.django-auth-ldap https://github.com/r-ryantm/nixpkgs/archive/d158476f6d35ea676cb44fa0b125aa584a03a8b0.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/zlh1jxl5jky18vsnb6qcfcmzd9wdjiy8-python3.7-django-auth-ldap-2.3.0
ls -la /nix/store/zlh1jxl5jky18vsnb6qcfcmzd9wdjiy8-python3.7-django-auth-ldap-2.3.0/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
3 packages built:
python37Packages.django-auth-ldap
python38Packages.django-auth-ldap
python39Packages.django-auth-ldap
Maintainer pings
cc @mmai for testing.
Result of nixpkgs-review pr 113482 at d158476f run on aarch64-linux 1
3 packages built:
python37Packages.django-auth-ldap
python38Packages.django-auth-ldap
python39Packages.django-auth-ldap
|
2025-04-01T06:37:18.622059
| 2021-02-24T01:43:14
|
814999722
|
{
"authors": [
"fabaff",
"marsam"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2074",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/114198"
}
|
gharchive/pull-request
|
zeek: 3.2.3 -> 3.2.4
Motivation for this change
https://github.com/zeek/zeek/releases/tag/v3.2.4
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[x] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 114198 run on x86_64-linux 1
1 package built:
zeek
|
2025-04-01T06:37:18.634665
| 2021-03-10T02:55:58
|
826994917
|
{
"authors": [
"r-ryantm",
"risicle"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2075",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/115679"
}
|
gharchive/pull-request
|
liburcu: 0.12.1 -> 0.12.2
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/liburcu/versions.
meta.description for liburcu is: "Userspace RCU (read-copy-update) library"
meta.homepage for liburcu is: "https://lttng.org/urcu"
meta.changelog for liburcu is: ""
Updates performed
Version update
To inspect upstream changes
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
0 of 0 passed binary check by having a zero exit code.
0 of 0 passed binary check by having the new version present in output.
found 0.12.2 with grep in /nix/store/pxnbsjsc4cdvssbdzsqlwp6lpc0k6jlw-liburcu-0.12.2
directory tree listing: https://gist.github.com/1f47726e757fb7834481a662e34e6f23
du listing: https://gist.github.com/0493fa32bbae6ae5eac2181764686ce9
Rebuild report (if merged into master) (click to expand)
105 total rebuild path(s)
46 package rebuild(s)
46 x86_64-linux rebuild(s)
23 i686-linux rebuild(s)
9 x86_64-darwin rebuild(s)
27 aarch64-linux rebuild(s)
First fifty rebuilds by attrpath
appgate-sdp
aws-workspaces
bareos
bcachefs-tools
ceph
ceph-client
ceph-dev
codeql
coreclr
glusterfs
knot-dns
knot-resolver
libceph
liburcu
libvmi
lttng-tools
lttng-ust
multipath-tools
netsniff-ng
nfs-ganesha
ntirpc
osu-lazer
powershell
qemu_full
qemu_xen
qemu_xen-light
qemu_xen_4_10
qemu_xen_4_10-light
qubes-core-vchan-xen
samba4Full
sambaFull
vscode-extensions.ms-python.python
vscode-extensions.ms-vsliveshare.vsliveshare
xen
xen-light
xen-slim
xenPackages.xen-light
xenPackages.xen-slim
xenPackages.xen-vanilla
xenPackages.xen_4_10-light
xenPackages.xen_4_10-slim
xenPackages.xen_4_10-vanilla
xen_4_10
xen_4_10-light
xen_4_10-slim
zoxide
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/pxnbsjsc4cdvssbdzsqlwp6lpc0k6jlw-liburcu-0.12.2 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A liburcu https://github.com/r-ryantm/nixpkgs/archive/af3185cdf18dea307f76a0550436c9e29b45f628.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/pxnbsjsc4cdvssbdzsqlwp6lpc0k6jlw-liburcu-0.12.2
ls -la /nix/store/pxnbsjsc4cdvssbdzsqlwp6lpc0k6jlw-liburcu-0.12.2/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
2 packages marked as broken and skipped:
bareos
samba4Full
8 packages failed to build:
coreclr
libvmi
qemu_xen (qemu_xen_4_10)
qemu_xen-light (qemu_xen_4_10-light)
qubes-core-vchan-xen
xen
xen-light
xen-slim
23 packages built:
appgate-sdp
aws-workspaces
bcachefs-tools
ceph
ceph-client
codeql
glusterfs
knot-dns
knot-resolver
libceph
liburcu
lttngTools (lttng-tools)
lttngUst (lttng-ust)
multipath-tools (multipath_tools)
netsniff-ng
nfs-ganesha
ntirpc
osu-lazer
powershell
qemu_full
vscode-extensions.ms-python.python
vscode-extensions.ms-vsliveshare.vsliveshare
zoxide
Maintainer pings
cc @bjornfor for testing.
nixpkgs-review successful on macos 10.14
|
2025-04-01T06:37:18.641968
| 2021-04-09T17:35:48
|
854726924
|
{
"authors": [
"fabaff",
"r-rmcgibbo"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2076",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/118920"
}
|
gharchive/pull-request
|
python3Packages.pyezviz: init at <IP_ADDRESS>
Motivation for this change
Python interface for for Ezviz cameras
https://github.com/baqs/pyEzviz/
This is a Home Assistant dependency.
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[x] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 118920 run on x86_64-linux 1
2 packages built:
python38Packages.pyezviz
python39Packages.pyezviz
Result of nixpkgs-review pr 118920 at cb564f15 run on aarch64-linux 1
2 packages built successfully:
python38Packages.pyezviz
python39Packages.pyezviz
|
2025-04-01T06:37:18.650372
| 2021-04-21T07:33:45
|
863540735
|
{
"authors": [
"LutzCle",
"Mic92",
"doronbehar"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2077",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/120032"
}
|
gharchive/pull-request
|
zoom-us 5.6.13632.0328 -> 5.6.16775.0418
Motivation for this change
zoom-us currently is in a broken state.
Version 5.6.13632.0328 is blocked from participating in calls, and fails with a "please upgrade to the latest version" message. At the same time, the tar file that is supposed to be version 5.6.16775.0418 is bit-identical to the previous version.
Thus, no upgrade path to fix the issue is currently available using a tar file.
In consequence, this PR upgrades to the current version using the .deb file provided by Zoom for Debian/Ubuntu.
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[ ] Fits CONTRIBUTING.md.
backport: https://github.com/NixOS/nixpkgs/pull/120038
Update: Yesterday I submitted a ticket with Zoom. The tar file has now been fixed, and I have verified that upgrading via the tar works again.
Update: Yesterday I submitted a ticket with Zoom. The tar file has now been fixed, and I have verified that upgrading via the tar works again.
Thanks for the update. Using the tarball again in https://github.com/NixOS/nixpkgs/pull/120243 - targeting master and in https://github.com/NixOS/nixpkgs/pull/120242 a backport + fix for the stable channel.
|
2025-04-01T06:37:18.658204
| 2021-06-08T19:26:06
|
915389060
|
{
"authors": [
"jonringer",
"vcunat"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2078",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/126251"
}
|
gharchive/pull-request
|
[21.05] Staging next
Motivation for this change
Jobset: https://hydra.nixos.org/jobset/nixpkgs/staging-21.05
previous 21.05 staging next PR: #124341
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[ ] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
21.11 Release Notes
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
I think I'll pause these stable branch staging-next's until hydra recovers. (<60k queued builds)
I don't think that is needed. Typically the phase of jobset just discovering builds already in cache is quite fast.
I don't think that is needed. Typically the phase of jobset just discovering builds already in cache is quite fast. EDIT: it seemed (mostly?) done when I first posted this comment already.
staging-next-21.05 shares haven't been dialed back from stabilizing the release. Most jobsets have <1000 shares, staging-next-21.05 has 20M https://hydra.nixos.org/jobset/nixpkgs/staging-next-21.05#tabs-configuration
OK, that might be set lower now if there's nothing really urgent, I suppose, but it seems just a matter of relative priorities.
|
2025-04-01T06:37:18.668776
| 2021-07-03T14:37:10
|
936267060
|
{
"authors": [
"bobby285271"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2079",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/129136"
}
|
gharchive/pull-request
|
nixos/doc: convert "Chapter 58. Writing NixOS Modules" to CommonMark
Note for reviewers
Thank you for reviewing this PR. :-)
This PR also fixes a small typo in Example 58.12, it should be "Definition of attribute sets of submodules" :-)
The conversion of the examples is done manually, I handle examples in the following way:
The example itself:
::: {#ex-the-id-of-the-example .example}
::: {.title}
**Example: The Name of the Example**
:::
The content of the example.
:::
Mentioning a example:
See [Example: The Name of the Example](#ex-the-id-of-the-example) for more details.
It seems that CommonMark -> DocBook (using Pandoc) won't convert .example into <example></example>, but I still used .example because DocBook will be dropped one day and CommonMark -> HTML (using Pandoc) will produce <div class="example"></div> which I think will be fine to handle.
If you have a better idea about how to handle examples feel free to comment, thanks!
Motivation for this change
Related GitHub project
Related Discourse post
Things done
Do conversion of eight files from DocBook to CommonMark per RFC 72.
nixos/doc/manual/development/option-declarations.xml
nixos/doc/manual/development/option-types.xml
nixos/doc/manual/development/option-def.xml
nixos/doc/manual/development/meta-attributes.xml
nixos/doc/manual/development/importing-modules.xml
nixos/doc/manual/development/replace-modules.xml
nixos/doc/manual/development/freeform-modules.xml
nixos/doc/manual/development/settings-options.xml
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
21.11 Release Notes (or backporting 21.05 Relase notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Will update all options links (if any) to only use the URI fragment tomorrow.
|
2025-04-01T06:37:18.670943
| 2021-08-10T14:03:39
|
965018550
|
{
"authors": [
"vcunat"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2080",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/133385"
}
|
gharchive/pull-request
|
zeroadPackages.zeroad-unwrapped: make it build on Hydra
This time for real, I hope. I'm sorry for my incomplete advice;
the explicit dontRecurseIntoAttrs confused me about what's the default
behavior in here.
Things done
(nothing applies... no hashes change)
Oops, duplicate of https://github.com/NixOS/nixpkgs/pull/133379
I checked but a bit earlier...
|
2025-04-01T06:37:18.683097
| 2021-08-15T07:34:38
|
971071995
|
{
"authors": [
"cdepillabout",
"samuelrivas"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2081",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/134124"
}
|
gharchive/pull-request
|
haskellPackages.readline: fix Setup.hs to work with Cabal 3
See https://github.com/NixOS/nixpkgs/pull/111985/ for previous discussion
Motivation for this change
readline is broken for Cabal3 build. I fixed it previously in this pull request, but the fix seems to have disappeared. I just reapplied it.
Is there a better way to keep this fix in place for the future? As you can seen in the previous PR, we tried to reach the maintainers of this package but we didn't succeed.
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[ ] NixOS
[ ] macOS
[x] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[X] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
21.11 Release Notes (or backporting 21.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[X] Fits CONTRIBUTING.md.
Is there a better way to keep this fix in place for the future?
It might be a better idea to send this PR to the haskell-updates branch, and then back-port this PR after it is merged in there.
Each nixos release is branched-off from the master branch here in nixpkgs. https://github.com/NixOS/nixpkgs/pull/111985 was sent to release-20.09, so it never ended up in master. Sorry for not let telling you about this at the time.
If you send a PR to haskell-updates, then it should get merged into master.
I think there is some sort of action that lets us automatically create a backport, so hopefully it is not too much additional work for you.
As you can seen in the previous PR, we tried to reach the maintainers of this package but we didn't succeed.
One thing I was wondering, is there a repo for this readline package on github? If so, can you create an issue or send a PR there and link to it from a comment in the code? If you are able to send a PR, then you should also just be able to fetchpatch from that PR, which would mean that we wouldn't need to carry this patch around in nixpkgs.
If there is no upstream repo, the we'll probably have to carry around this patch in nixpkgs.
If you send a PR to haskell-updates, then it should get merged into master.
I think there is some sort of action that lets us automatically create a backport, so hopefully it is not too much additional work for you.
Ok, thanks. I'll look into sending this to haskell-updates then.
One thing I was wondering, is there a repo for this readline package on github? If so, can you create an issue or send a PR there and link to it from a comment in the code? If you are able to send a PR, then you should also just be able to fetchpatch from that PR, which would mean that we wouldn't need to carry this patch around in nixpkgs.
If there is no upstream repo, the we'll probably have to carry around this patch in nixpkgs.
I could not find any upstream repo for this package the other time, but from a bit of googling I believe Jan Stolarek may be the maintainer, I have just sent an email to them.
Otherwise I could also upload the source to my github and host the patch there, but that is also relatively ugly as it would end up being a sort of fork from hackage.
Should I close this PR then? I'll open another one to haskell-updates
I went ahead and created the new PR https://github.com/NixOS/nixpkgs/pull/134295.
Still trying to find a maintainer in parallel :)
|
2025-04-01T06:37:18.690095
| 2021-08-22T16:29:46
|
976416245
|
{
"authors": [
"figsoda",
"yusdacra"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2082",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/135311"
}
|
gharchive/pull-request
|
helix: 0.4.0 -> 0.4.1
Motivation for this change
Update helix to 0.4.1
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
21.11 Release Notes (or backporting 21.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 135311 run on x86_64-linux 1
1 package built:
helix
|
2025-04-01T06:37:18.715217
| 2021-09-11T03:54:55
|
993739079
|
{
"authors": [
"r-rmcgibbo",
"r-ryantm"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2083",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/137347"
}
|
gharchive/pull-request
|
python38Packages.databricks-connect: 8.1.11 -> 8.1.12
Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript.
meta.description for python38Packages.databricks-connect is: "Client for connecting to remote Databricks clusters"
meta.homepage for python38Packages.databricks-connect is: "https://pypi.org/project/databricks-connect"
meta.changelog for python38Packages.databricks-connect is: ""
Updates performed
Ran passthru.UpdateScript
To inspect upstream changes
Impact
Checks done (click to expand)
built on NixOS
Warning: a test defined in passthru.tests did not pass
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/beeline passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/beeline.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/docker-image-tool.sh passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/find-spark-home passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/find-spark-home.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/find_spark_home.py passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/load-spark-env.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/load-spark-env.sh passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/pyspark passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/pyspark-bazel passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/pyspark.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/pyspark2.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/quicksilver passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/run-example passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/run-example.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-class passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-class.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-class2.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-shell passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-shell-bazel passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-shell.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-shell2.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-sql passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-sql.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-sql2.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-submit passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-submit.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-submit2.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/sparkR passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/sparkR.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/sparkR2.cmd passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/databricks-connect passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/.find_spark_home.py-wrapped passed the binary check.
/nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/.databricks-connect-wrapped passed the binary check.
7 of 34 passed binary check by having a zero exit code.
32 of 34 passed binary check by having the new version present in output.
found 8.1.12 with grep in /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12
found 8.1.12 in filename of file in /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12
directory tree listing: https://gist.github.com/1e7f7e09854e24ae5a783adad9b6f8c8
du listing: https://gist.github.com/9838824d56b713b18b4f189666c6a0ea
Rebuild report (if merged into master) (click to expand)
8 total rebuild path(s)
2 package rebuild(s)
2 x86_64-linux rebuild(s)
2 i686-linux rebuild(s)
2 x86_64-darwin rebuild(s)
2 aarch64-linux rebuild(s)
First fifty rebuilds by attrpath
python38Packages.databricks-connect
python39Packages.databricks-connect
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A python38Packages.databricks-connect https://github.com/r-ryantm/nixpkgs/archive/1b9987bfd9678179115c9cacd444e7bad8df3a36.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12
ls -la /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
2 packages built:
python38Packages.databricks-connect
python39Packages.databricks-connect
Maintainer pings
cc @kfollesdal for testing.
Result of nixpkgs-review pr 137347 at 1b9987bf run on aarch64-linux 1
2 packages built successfully:
python38Packages.databricks-connect
python39Packages.databricks-connect
|
2025-04-01T06:37:18.721725
| 2021-09-17T04:39:03
|
998931973
|
{
"authors": [
"VergeDX",
"bobby285271",
"figsoda"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2084",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/138225"
}
|
gharchive/pull-request
|
vscode-extensions.mvllow.rose-pine: init at 1.3.6
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
21.11 Release Notes (or backporting 21.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
@ofborg eval
Result of nixpkgs-review pr 138225 run on x86_64-linux 1
1 package built:
vscode-extensions.mvllow.rose-pine
|
2025-04-01T06:37:18.730249
| 2021-10-09T10:46:26
|
1021676078
|
{
"authors": [
"Mindavi",
"fabaff",
"risicle"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2085",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/141090"
}
|
gharchive/pull-request
|
libwebsockets: 4.2.1 -> 4.3.0
Motivation for this change
Update to latest upstream release 4.3.0
Change log: https://libwebsockets.org/git/libwebsockets/tree/changelog
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
21.11 Release Notes (or backporting 21.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 141090 run on x86_64-linux 1
1 package failed to build:
driftnet
4 packages built:
ardour
janus-gateway
libwebsockets (libwebsockets_4_3)
ttyd
On nixos x86_64:
builder for '/nix/store/20qgg23xpy1ykam4hriv1f7bixd4ia2x-driftnet-1.3.0.drv' failed with exit code 2; last 10 log lines:
194 | { NULL, NULL } // sentinel
| ^
httpd.c:194:9: note: (near initialization for 'mount')
httpd.c:194:9: warning: excess elements in struct initializer
httpd.c:194:9: note: (near initialization for 'mount')
make[2]: *** [Makefile:375: httpd.o] Error 1
make[2]: Leaving directory '/build/source/src/http_display'
make[1]: *** [Makefile:454: all-recursive] Error 1
make[1]: Leaving directory '/build/source/src'
make: *** [Makefile:428: all-recursive] Error 1
Diff LGTM. Haven't found time to test this yet. Upstream appears to have enabled -Werror by default, which I'd like to have disabled to decrease the burden for compiler upgrades. Otherwise changelog looks ok too.
|
2025-04-01T06:37:18.738786
| 2021-11-26T17:12:25
|
1064704021
|
{
"authors": [
"zowoq"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2086",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/147512"
}
|
gharchive/pull-request
|
skopeo: 1.5.1 -> 1.5.2
https://github.com/containers/skopeo/releases/tag/v1.5.2
Motivation for this change
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
21.11 Release Notes (or backporting 21.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[x] Fits CONTRIBUTING.md.
@ofborg eval
|
2025-04-01T06:37:18.750120
| 2022-01-20T11:34:33
|
1109190975
|
{
"authors": [
"fabaff",
"r-ryantm"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2087",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/155856"
}
|
gharchive/pull-request
|
python310Packages.pyvlx: 0.2.19 -> 0.2.20
Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript.
meta.description for python310Packages.pyvlx is: "Python client to work with Velux units"
meta.homepage for python310Packages.pyvlx is: "https://github.com/Julius2342/pyvlx"
meta.changelog for python310Packages.pyvlx is: ""
Updates performed
Ran passthru.UpdateScript
To inspect upstream changes
Release on GitHub
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
0 of 0 passed binary check by having a zero exit code.
0 of 0 passed binary check by having the new version present in output.
found 0.2.20 with grep in /nix/store/j5nwiid099imnn0iiqranwpw4p3b3xjz-python3.10-pyvlx-0.2.20
found 0.2.20 in filename of file in /nix/store/j5nwiid099imnn0iiqranwpw4p3b3xjz-python3.10-pyvlx-0.2.20
Rebuild report (if merged into master) (click to expand)
4 total rebuild path(s)
2 package rebuild(s)
2 x86_64-linux rebuild(s)
2 x86_64-darwin rebuild(s)
First fifty rebuilds by attrpath
python310Packages.pyvlx
python39Packages.pyvlx
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/j5nwiid099imnn0iiqranwpw4p3b3xjz-python3.10-pyvlx-0.2.20 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A python310Packages.pyvlx https://github.com/r-ryantm/nixpkgs/archive/61aa5d293b474733dda8a749a3e31ce635f40707.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/j5nwiid099imnn0iiqranwpw4p3b3xjz-python3.10-pyvlx-0.2.20
ls -la /nix/store/j5nwiid099imnn0iiqranwpw4p3b3xjz-python3.10-pyvlx-0.2.20/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
2 packages built:
python310Packages.pyvlx
python39Packages.pyvlx
Maintainer pings
cc @fabaff for testing.
Result of nixpkgs-review pr 155856 run on x86_64-linux 1
2 packages built:
python310Packages.pyvlx
python39Packages.pyvlx
|
2025-04-01T06:37:18.761538
| 2022-02-17T04:57:00
|
1140877498
|
{
"authors": [
"davidak",
"r-ryantm"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2088",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/160424"
}
|
gharchive/pull-request
|
phoronix-test-suite: 10.8.1 -> 10.8.2
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/phoronix-test-suite/versions.
meta.description for phoronix-test-suite is: "Open-Source, Automated Benchmarking"
meta.homepage for phoronix-test-suite is: "https://www.phoronix-test-suite.com/"
meta.changelog for phoronix-test-suite is: ""
Updates performed
Version update
To inspect upstream changes
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
Warning: no invocation of /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2/bin/.phoronix-test-suite-wrapped had a zero exit code or showed the expected version
Warning: no invocation of /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2/bin/phoronix-test-suite had a zero exit code or showed the expected version
0 of 2 passed binary check by having a zero exit code.
0 of 2 passed binary check by having the new version present in output.
found 10.8.2 with grep in /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2
found 10.8.2 in filename of file in /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2
Rebuild report (if merged into master) (click to expand)
2 total rebuild path(s)
1 package rebuild(s)
1 x86_64-linux rebuild(s)
1 x86_64-darwin rebuild(s)
First fifty rebuilds by attrpath
phoronix-test-suite
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A phoronix-test-suite https://github.com/r-ryantm/nixpkgs/archive/a7c9fa3eab823271cbc5ece7771c48d8ccca4ceb.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2
ls -la /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
phoronix-test-suite
Maintainer pings
cc @davidak for testing.
Result of nixpkgs-review pr 160424 run on x86_64-linux 1
1 package built:
phoronix-test-suite
|
2025-04-01T06:37:18.770289
| 2016-07-21T15:47:20
|
166853272
|
{
"authors": [
"garbas",
"mimadrid",
"obadz",
"vcunat"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2089",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/17152"
}
|
gharchive/pull-request
|
curl: 7.47.1 -> 7.50.0
Motivation for this change
Update curl to the last version
Things done
[X] Tested using sandboxing
(nix.useChroot on NixOS,
or option build-use-chroot in nix.conf
on non-NixOS)
Built on platform(s)
[X] NixOS
[ ] OS X
[ ] Linux
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[X] Tested execution of all binary files (usually in ./result/bin/)
[X] Fits CONTRIBUTING.md.
@vcunat, do you want to pull this into staging?
I'm confident curl doesn't cause a mass rebuild.
The change seems safe API-wise, too.
In that, merging now as it seems to build and runs fine.
@aycanirican pointed out in https://github.com/NixOS/nixpkgs/commit/fa03b541b2e6cd62761f1e9778654de99b0d4ec6#commitcomment-18462996 that this broke aws-sdk-cpp.
/tmp/nix-build-aws-sdk-cpp-0.13.11.drv-0/aws-sdk-cpp-0.13.11-src/aws-cpp-sdk-core/source/http/curl/CurlHandleContainer.cpp:123:5: error: invalid conversion from 'void*' to 'CURL* {aka Curl_easy*}' [-fpermissive]
curl_easy_setopt(handle, CURLOPT_NOSIGNAL, 1L);
^
In file included from /nix/store/idqyp6skbp1mp3w8xz3babcndcsnn6ax-curl-7.50.0-dev/include/curl/curl.h:2420:0,
Bumping the version of aws-sdk-cpp does not fix the issue.
Choices are either to revert to to create a parallel version of curl just for aws-sdk-cpp until they bump.
Thoughts?
Might make sense to wait until hydra comes back up to see the extent of what was broken by this commit
NIX_CFLAGS_COMPILE = '-fpermissive' should fix those cases, as suggested by the error message.
Thanks, done!
I'm confident curl doesn't cause a mass rebuild.
Now I see it does cause a nontrivial rebuild due to systemd indirectly depending on it. It wasn't the case about a year ago...
this broke nix on darwin and many other packages because of https://github.com/curl/curl/issues/926. lets stabilize this via staging please. otherwise others can not work on other packages in nixpkgs.
|
2025-04-01T06:37:18.779059
| 2022-07-04T17:47:35
|
1293444410
|
{
"authors": [
"Luflosi",
"nixos-discourse"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2090",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/180148"
}
|
gharchive/pull-request
|
nixos/nginx: fix broken listenAddresses example
Description of changes
When using the example without the square brackets, nginx fails to start:
nginx-pre-start: nginx: [emerg] invalid port in "::1:80" of the "listen" directive in /nix/store/xyz-nginx.conf:29
nginx-pre-start: nginx: configuration file /nix/store/xyz-nginx.conf test failed
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
22.11 Release Notes (or backporting 22.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[x] Fits CONTRIBUTING.md.
This pull request has been mentioned on NixOS Discourse. There might be relevant details there:
https://discourse.nixos.org/t/prs-ready-for-review/3032/1026
|
2025-04-01T06:37:18.799447
| 2022-07-29T22:36:00
|
1322736358
|
{
"authors": [
"onny",
"r-ryantm"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2091",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/183843"
}
|
gharchive/pull-request
|
sensu-go-cli: 6.6.6 -> 6.7.5
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://github.com/sensu/sensu-go/releases.
meta.description for sensu-go-cli is: "Open source monitoring tool for ephemeral infrastructure & distributed applications"
meta.homepage for sensu-go-cli is: "https://sensu.io"
meta.changelog for sensu-go-cli is: ""
Updates performed
Golang update
To inspect upstream changes
Release on GitHub
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 6.7.4 with grep in /nix/store/l52i5q4w45n8wbyn2gdi5dxdc2sm0fsj-sensu-go-cli-6.7.4
found 6.7.4 in filename of file in /nix/store/l52i5q4w45n8wbyn2gdi5dxdc2sm0fsj-sensu-go-cli-6.7.4
Rebuild report (if merged into master) (click to expand)
3 total rebuild path(s)
3 package rebuild(s)
First fifty rebuilds by attrpath
sensu-go-agent
sensu-go-backend
sensu-go-cli
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/l52i5q4w45n8wbyn2gdi5dxdc2sm0fsj-sensu-go-cli-6.7.4 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A sensu-go-cli https://github.com/r-ryantm/nixpkgs/archive/20673179e3e10849c9410b6f37decc9a8a0681fe.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/l52i5q4w45n8wbyn2gdi5dxdc2sm0fsj-sensu-go-cli-6.7.4
ls -la /nix/store/l52i5q4w45n8wbyn2gdi5dxdc2sm0fsj-sensu-go-cli-6.7.4/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
3 packages built:
sensu-go-agent
sensu-go-backend
sensu-go-cli
Maintainer pings
cc @thefloweringash for testing.
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://github.com/sensu/sensu-go/releases.
meta.description for sensu-go-cli is: "Open source monitoring tool for ephemeral infrastructure & distributed applications"
meta.homepage for sensu-go-cli is: "https://sensu.io"
meta.changelog for sensu-go-cli is: ""
Updates performed
Golang update
To inspect upstream changes
Release on GitHub
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 6.7.5 with grep in /nix/store/6kgzzawjry963qdc4ds172v4clshrp52-sensu-go-cli-6.7.5
found 6.7.5 in filename of file in /nix/store/6kgzzawjry963qdc4ds172v4clshrp52-sensu-go-cli-6.7.5
Rebuild report (if merged into master) (click to expand)
3 total rebuild path(s)
3 package rebuild(s)
First fifty rebuilds by attrpath
sensu-go-agent
sensu-go-backend
sensu-go-cli
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/6kgzzawjry963qdc4ds172v4clshrp52-sensu-go-cli-6.7.5 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A sensu-go-cli https://github.com/r-ryantm/nixpkgs/archive/95898d794e963265790ac427f7c1566356609b19.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/6kgzzawjry963qdc4ds172v4clshrp52-sensu-go-cli-6.7.5
ls -la /nix/store/6kgzzawjry963qdc4ds172v4clshrp52-sensu-go-cli-6.7.5/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
3 packages built:
sensu-go-agent
sensu-go-backend
sensu-go-cli
Maintainer pings
cc @thefloweringash for testing.
Result of nixpkgs-review pr 183843 run on x86_64-linux 1
3 packages built:
sensu-go-agent
sensu-go-backend
sensu-go-cli
|
2025-04-01T06:37:18.809551
| 2022-08-17T01:48:22
|
1341062545
|
{
"authors": [
"onny",
"r-ryantm"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2092",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/187055"
}
|
gharchive/pull-request
|
xcp: 0.9.0 -> 0.9.1
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/xcp/versions.
meta.description for xcp is: "An extended cp(1)"
meta.homepage for xcp is: "https://github.com/tarka/xcp"
meta.changelog for xcp is: ""
Updates performed
Rust version update
To inspect upstream changes
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 0.9.1 with grep in /nix/store/l8fiyfhabr2hqka9rnz563gb8hxghr0s-xcp-0.9.1
found 0.9.1 in filename of file in /nix/store/l8fiyfhabr2hqka9rnz563gb8hxghr0s-xcp-0.9.1
Rebuild report (if merged into master) (click to expand)
1 total rebuild path(s)
1 package rebuild(s)
First fifty rebuilds by attrpath
xcp
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/l8fiyfhabr2hqka9rnz563gb8hxghr0s-xcp-0.9.1 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A xcp https://github.com/r-ryantm/nixpkgs/archive/3c5c3ce1aad4e3b7ec6c349718262e4d91b3af33.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/l8fiyfhabr2hqka9rnz563gb8hxghr0s-xcp-0.9.1
ls -la /nix/store/l8fiyfhabr2hqka9rnz563gb8hxghr0s-xcp-0.9.1/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
xcp
Maintainer pings
cc @legendofmiracles for testing.
Result of nixpkgs-review pr 187055 run on x86_64-linux 1
1 package built:
xcp
|
2025-04-01T06:37:18.815426
| 2016-10-23T14:18:27
|
184692663
|
{
"authors": [
"Mic92",
"copumpkin",
"mikesperber",
"vcunat"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2093",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/19800"
}
|
gharchive/pull-request
|
Fix texlive on darwin
Motivation for this change
texlive-2016 would not build on Darwin.
Things done
Unbreak build of clisp on Darwin (on which xindy depends on which texlive depends), which previously was Linux only.
Add a dependency to xindy to libiconv.
[ ] Tested using sandboxing
(nix.useSandbox on NixOS,
or option build-use-sandbox in nix.conf
on non-NixOS)
Built on platform(s)
[ ] NixOS
[x] OS X
[ ] Linux
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[x] Fits CONTRIBUTING.md.
ping @vbgl @matthewbauer @LnL7
cc @acowley
Thanks for the review! Done.
It's not perfect, apparently: https://github.com/NixOS/nixpkgs/issues/20062
|
2025-04-01T06:37:18.840776
| 2022-11-02T17:33:29
|
1433531838
|
{
"authors": [
"r-ryantm"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2094",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/199198"
}
|
gharchive/pull-request
|
klipper: unstable-2022-10-25 -> unstable-2022-11-02
Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript.
meta.description for klipper is: "The Klipper 3D printer firmware"
meta.homepage for klipper is: "https://github.com/KevinOConnor/klipper"
meta.changelog for klipper is: ""
Updates performed
Ran passthru.UpdateScript
To inspect upstream changes
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found unstable-2022-10-31 in filename of file in /nix/store/l3mgmrh3i67r56fbmrw7gsywcmpny728-klipper-unstable-2022-10-31
Rebuild report (if merged into master) (click to expand)
4 total rebuild path(s)
4 package rebuild(s)
First fifty rebuilds by attrpath
klipper
klipper-firmware
klipper-flash
klipper-genconf
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/l3mgmrh3i67r56fbmrw7gsywcmpny728-klipper-unstable-2022-10-31 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A klipper https://github.com/r-ryantm/nixpkgs/archive/431344ba195f2df9e437cf2bdbdf0e286b18ce0d.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/l3mgmrh3i67r56fbmrw7gsywcmpny728-klipper-unstable-2022-10-31
ls -la /nix/store/l3mgmrh3i67r56fbmrw7gsywcmpny728-klipper-unstable-2022-10-31/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
4 packages built:
klipper
klipper-firmware
klipper-flash
klipper-genconf
Maintainer pings
cc @lovesegfault @zhaofengli @cab404 for testing.
Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript.
meta.description for klipper is: "The Klipper 3D printer firmware"
meta.homepage for klipper is: "https://github.com/KevinOConnor/klipper"
meta.changelog for klipper is: ""
Updates performed
Ran passthru.UpdateScript
To inspect upstream changes
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found unstable-2022-11-02 in filename of file in /nix/store/xm7f6vxgh4r6mixgj7fwbf4xs8fna9gl-klipper-unstable-2022-11-02
Rebuild report (if merged into master) (click to expand)
4 total rebuild path(s)
4 package rebuild(s)
First fifty rebuilds by attrpath
klipper
klipper-firmware
klipper-flash
klipper-genconf
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/xm7f6vxgh4r6mixgj7fwbf4xs8fna9gl-klipper-unstable-2022-11-02 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A klipper https://github.com/r-ryantm/nixpkgs/archive/8bcdd0df374d74eada46607edc9d6c6258f30f60.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/xm7f6vxgh4r6mixgj7fwbf4xs8fna9gl-klipper-unstable-2022-11-02
ls -la /nix/store/xm7f6vxgh4r6mixgj7fwbf4xs8fna9gl-klipper-unstable-2022-11-02/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
4 packages built:
klipper
klipper-firmware
klipper-flash
klipper-genconf
Maintainer pings
cc @lovesegfault @zhaofengli @cab404 for testing.
Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript.
meta.description for klipper is: "The Klipper 3D printer firmware"
meta.homepage for klipper is: "https://github.com/KevinOConnor/klipper"
meta.changelog for klipper is: ""
Updates performed
Ran passthru.UpdateScript
To inspect upstream changes
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found unstable-2022-11-03 in filename of file in /nix/store/s60vnjq931xkvh2hrbrhwfnszhm5b7iw-klipper-unstable-2022-11-03
Rebuild report (if merged into master) (click to expand)
4 total rebuild path(s)
4 package rebuild(s)
First fifty rebuilds by attrpath
klipper
klipper-firmware
klipper-flash
klipper-genconf
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/s60vnjq931xkvh2hrbrhwfnszhm5b7iw-klipper-unstable-2022-11-03 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A klipper https://github.com/r-ryantm/nixpkgs/archive/ace92a6aec0b1b00f082a17c6d4cbbb3736418c4.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/s60vnjq931xkvh2hrbrhwfnszhm5b7iw-klipper-unstable-2022-11-03
ls -la /nix/store/s60vnjq931xkvh2hrbrhwfnszhm5b7iw-klipper-unstable-2022-11-03/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
4 packages built:
klipper
klipper-firmware
klipper-flash
klipper-genconf
Maintainer pings
cc @lovesegfault @zhaofengli @cab404 for testing.
|
2025-04-01T06:37:18.852672
| 2022-12-18T04:21:03
|
1501738379
|
{
"authors": [
"clerie",
"figsoda",
"joseluisq",
"nixos-discourse"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2095",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/206662"
}
|
gharchive/pull-request
|
static-web-server: init at 2.14.1
Description of changes
https://sws.joseluisq.net
https://github.com/static-web-server/static-web-server
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[x] x86_64-darwin
[x] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[x] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
23.05 Release Notes (or backporting 22.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[x] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 206662 run on x86_64-linux 1
1 package built:
static-web-server
Huh, merged before finishing review 😅
Anyway, started server and it returned content as expected :)
SWS maintainer here.
Just a bit late thanks to all you guys and specially @figsoda for the effort to incorporate SWS into nixpkgs ⚡
It should be mentioned in the installation doc section soon.
This pull request has been mentioned on NixOS Discourse. There might be relevant details there:
https://discourse.nixos.org/t/testing-a-new-module-and-package-without-breaking-my-stable-nixos-install/27129/1
|
2025-04-01T06:37:18.862976
| 2023-01-31T11:11:19
|
1564108124
|
{
"authors": [
"JulienMalka",
"r-ryantm"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2096",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/213751"
}
|
gharchive/pull-request
|
praat: 6.3.04 -> 6.3.05
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://github.com/praat/praat/releases.
meta.description for praat is: Doing phonetics by computer
meta.homepage for praat is: https://www.fon.hum.uva.nl/praat/
Updates performed
Version update
To inspect upstream changes
Release on GitHub
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 6.3.05 with grep in /nix/store/wa6j5adglnssdspjnl47d99y86xx7cnn-praat-6.3.05
found 6.3.05 in filename of file in /nix/store/wa6j5adglnssdspjnl47d99y86xx7cnn-praat-6.3.05
Rebuild report (if merged into master) (click to expand)
1 total rebuild path(s)
1 package rebuild(s)
First fifty rebuilds by attrpath
praat
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/wa6j5adglnssdspjnl47d99y86xx7cnn-praat-6.3.05 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A praat https://github.com/r-ryantm/nixpkgs/archive/6616e69312ec69c0c7246e6cb150928f662466b0.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/wa6j5adglnssdspjnl47d99y86xx7cnn-praat-6.3.05
ls -la /nix/store/wa6j5adglnssdspjnl47d99y86xx7cnn-praat-6.3.05/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
praat
Maintainer pings
cc @orivej for testing.
Result of nixpkgs-review pr 213751 run on x86_64-linux 1
1 package built:
praat
|
2025-04-01T06:37:18.872639
| 2023-05-07T12:02:40
|
1699033395
|
{
"authors": [
"fabaff"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2097",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/230507"
}
|
gharchive/pull-request
|
python311Packages.mkdocstrings-python: 0.9.0 -> 0.10.0
Changelog: https://github.com/mkdocstrings/python/blob/0.10.0/CHANGELOG.md
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.05 Release Notes (or backporting 22.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 230507 run on x86_64-linux 1
1 package marked as broken and skipped:
netbox_3_3
5 packages built:
netbox
python310Packages.mkdocstrings-python
python310Packages.mkdocstrings-python.dist
python311Packages.mkdocstrings-python
python311Packages.mkdocstrings-python.dist
|
2025-04-01T06:37:18.880981
| 2023-05-14T17:52:12
|
1709022868
|
{
"authors": [
"SuperSandro2000"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2098",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/231891"
}
|
gharchive/pull-request
|
nixos/no-x-libs: add gst-plugins-bad, gst-plugins-rs
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.05 Release Notes (or backporting 22.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
The gst-plugins-base hack is very similar to https://github.com/NixOS/nixpkgs/pull/231185/files#diff-bd924545a322bae41a5f57f50113281417c8ea50fec7801f606840410f492164R169
|
2025-04-01T06:37:18.889908
| 2023-05-15T14:49:05
|
1710260873
|
{
"authors": [
"hellwolf",
"nixos-discourse"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2099",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/232056"
}
|
gharchive/pull-request
|
owncloud: 3.2.1 -> 4.0.0
Description of changes
Upgrade owncloud 3.2.1 -> 4.0.0
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[-] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
23.05 Release Notes (or backporting 22.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
@ofborg build owncloud
This pull request has been mentioned on NixOS Discourse. There might be relevant details there:
https://discourse.nixos.org/t/prs-ready-for-review/3032/2218
|
2025-04-01T06:37:18.897823
| 2023-05-26T23:56:25
|
1728353101
|
{
"authors": [
"wegank"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2100",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/234329"
}
|
gharchive/pull-request
|
sonic-server: migrate to bindgenHook
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[x] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.05 Release Notes (or backporting 22.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
@ofborg build sonic-server sonic-server.passthru.tests
|
2025-04-01T06:37:18.906581
| 2023-06-23T14:01:32
|
1771517514
|
{
"authors": [
"pbek",
"totoroot"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2101",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/239375"
}
|
gharchive/pull-request
|
qownnotes: 23.6.5 -> 23.6.6
Semi-automatic update generated by nixpkgs-update tools. This update was made based on information from repology.org.
meta.description for qownnotes is: Plain-text file notepad and todo-list manager with markdown support and Nextcloud/ownCloud integration
meta.homepage for qownnotes is: https://www.qownnotes.org/
meta.changelog for qownnotes is: https://www.qownnotes.org/changelog.html
Updates performed
Version update
To inspect upstream changes
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 23.6.6 with grep in /nix/store/j75gaa5qkar1rfiz7qcdqpbqcpfwcy37-qownnotes-23.6.6
found 23.6.6 in filename of file in /nix/store/j75gaa5qkar1rfiz7qcdqpbqcpfwcy37-qownnotes-23.6.6
Rebuild report (if merged into master) (click to expand)
1 total rebuild path(s)
1 package rebuild(s)
First fifty rebuilds by attrpath
qownnotes
Instructions to test this update (click to expand)
Build yourself:
nix-build -A qownnotes https://github.com/pbek/nixpkgs/archive/a9c0f2bd83553203465466e942052f93d8d2e391.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/j75gaa5qkar1rfiz7qcdqpbqcpfwcy37-qownnotes-23.6.6
ls -la /nix/store/j75gaa5qkar1rfiz7qcdqpbqcpfwcy37-qownnotes-23.6.6/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
qownnotes
Maintainer pings
cc @pbek @totoroot for testing.
Result of nixpkgs-review pr 239375 run on x86_64-linux 1
1 package built:
qownnotes
|
2025-04-01T06:37:18.942057
| 2023-07-12T19:38:04
|
1801635804
|
{
"authors": [
"r-ryantm"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2102",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/243134"
}
|
gharchive/pull-request
|
libplacebo: 5.264.1 -> 6.292.1
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/project/libplacebo/versions.
meta.description for libplacebo is: Reusable library for GPU-accelerated video/image rendering primitives
meta.homepage for libplacebo is: https://code.videolan.org/videolan/libplacebo
meta.changelog for libplacebo is: https://code.videolan.org/videolan/libplacebo/-/tags/v6.292.0
Updates performed
Version update
To inspect upstream changes
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 6.292.0 with grep in /nix/store/lyr948g6pc8sqxnv2xlivxk919vmk4h9-libplacebo-6.292.0
found 6.292.0 in filename of file in /nix/store/lyr948g6pc8sqxnv2xlivxk919vmk4h9-libplacebo-6.292.0
Rebuild report (if merged into master) (click to expand)
144 total rebuild path(s)
144 package rebuild(s)
First fifty rebuilds by attrpath
MIDIVisualizer
adl
ani-cli
anime-downloader
anki
arcanPackages.all-wrapped
arcanPackages.arcan
arcanPackages.arcan-wrapped
arcanPackages.cat9-wrapped
arcanPackages.durden-wrapped
arcanPackages.ffmpeg
arcanPackages.pipeworld-wrapped
arcanPackages.prio-wrapped
arcanPackages.xarcan
audiobookshelf
celluloid
corrscope
cplay-ng
curseradio
deepin.dde-gsettings-schemas
deepin.deepin-movie-reborn
deepin.deepin-music
deepin.deepin-voice-note
dmlive
dra-cla
eaglemode
ff2mpv
ffcast
ffmpeg-full
ffmpeg_4-full
ffmpeg_5-full
ffmpeg_6-full
gonic
handbrake
haruna
hydrus
hypnotix
imagination
jellyfin
jellyfin-ffmpeg
jellyfin-media-player
jellyfin-mpv-shim
jftui
kaffeine
klipperscreen
kphotoalbum
libplacebo
libsForQt5.elisa
libsForQt5.kdenlive
libsForQt5.phonon-backend-vlc
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/lyr948g6pc8sqxnv2xlivxk919vmk4h9-libplacebo-6.292.0 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A libplacebo https://github.com/r-ryantm/nixpkgs/archive/5836cbc28d5362a4ad467fb48e533ad28ebd10f0.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/lyr948g6pc8sqxnv2xlivxk919vmk4h9-libplacebo-6.292.0
ls -la /nix/store/lyr948g6pc8sqxnv2xlivxk919vmk4h9-libplacebo-6.292.0/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package marked as broken and skipped:
obs-studio-plugins.obs-hyperion
134 packages failed to build:
MIDIVisualizer
adl
ani-cli
anime-downloader
anki
arcanPackages.all-wrapped
arcanPackages.arcan
arcanPackages.arcan-wrapped
arcanPackages.cat9-wrapped
arcanPackages.durden-wrapped
arcanPackages.ffmpeg
arcanPackages.pipeworld-wrapped
arcanPackages.prio-wrapped
arcanPackages.xarcan
audiobookshelf
celluloid
corrscope
cplay-ng
curseradio
deepin.dde-gsettings-schemas
deepin.deepin-movie-reborn
deepin.deepin-music
deepin.deepin-voice-note
dmlive
dra-cla
eaglemode
ff2mpv
ffcast
ffmpeg_6-full
gonic
handbrake
haruna
hydrus
hypnotix
imagination
jellyfin
jellyfin-ffmpeg
jellyfin-media-player
jellyfin-mpv-shim
jftui
kaffeine
klipperscreen
kphotoalbum
libsForQt5.elisa
libsForQt5.kdenlive
libsForQt5.phonon-backend-vlc
libsForQt5.plasmatube
libsForQt5.soundkonverter
libvlc
liquidsoap
manim
megaglest
memento
minitube
mnemosyne
mpc-qt
mpv
mpv-unwrapped
mpvScripts.inhibit-gnome
mpvScripts.mpris
mpvScripts.thumbfast
mpvpaper
obs-studio
obs-studio-plugins.advanced-scene-switcher
obs-studio-plugins.droidcam-obs
obs-studio-plugins.input-overlay
obs-studio-plugins.looking-glass-obs
obs-studio-plugins.obs-3d-effect
obs-studio-plugins.obs-backgroundremoval
obs-studio-plugins.obs-command-source
obs-studio-plugins.obs-gradient-source
obs-studio-plugins.obs-gstreamer
obs-studio-plugins.obs-livesplit-one
obs-studio-plugins.obs-move-transition
obs-studio-plugins.obs-multi-rtmp
obs-studio-plugins.obs-mute-filter
obs-studio-plugins.obs-ndi
obs-studio-plugins.obs-nvfbc
obs-studio-plugins.obs-pipewire-audio-capture
obs-studio-plugins.obs-rgb-levels-filter
obs-studio-plugins.obs-scale-to-sound
obs-studio-plugins.obs-shaderfilter
obs-studio-plugins.obs-source-clone
obs-studio-plugins.obs-source-record
obs-studio-plugins.obs-source-switcher
obs-studio-plugins.obs-teleport
obs-studio-plugins.obs-text-pthread
obs-studio-plugins.obs-transition-table
obs-studio-plugins.obs-tuna
obs-studio-plugins.obs-vaapi
obs-studio-plugins.obs-vertical-canvas
obs-studio-plugins.obs-vintage-filter
obs-studio-plugins.obs-vkcapture
obs-studio-plugins.obs-websocket
obs-studio-plugins.waveform
obs-studio-plugins.wlrobs
peek
plex-media-player
plex-mpv-shim
printrun
pympress
python310Packages.aigpy
python310Packages.dm-sonnet
python310Packages.moderngl-window
python310Packages.mpv
python310Packages.pydub
python310Packages.pyglet
python310Packages.python-vlc
python310Packages.pytmx
python310Packages.tensorflow-datasets
python311Packages.aigpy
python311Packages.moderngl-window
python311Packages.mpv
python311Packages.pydub
python311Packages.pyglet
python311Packages.python-vlc
python311Packages.pytmx
qimgv
radioboat
reaper
restream
somafm-cli
strawberry
stremio
sublime-music
subtitleedit
sunshine
tidal-dl
tone
video-trimmer
vlc
vokoscreen
wtwitch
ytfzf
2 packages built:
ffmpeg_4-full
libplacebo
Maintainer pings
cc @primeos @tadeokondrak for testing.
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/project/libplacebo/versions.
meta.description for libplacebo is: Reusable library for GPU-accelerated video/image rendering primitives
meta.homepage for libplacebo is: https://code.videolan.org/videolan/libplacebo
meta.changelog for libplacebo is: https://code.videolan.org/videolan/libplacebo/-/tags/v6.292.1
Updates performed
Version update
To inspect upstream changes
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 6.292.1 with grep in /nix/store/kc2bqdndr3fq07qnc56zvy2ppwq655za-libplacebo-6.292.1
found 6.292.1 in filename of file in /nix/store/kc2bqdndr3fq07qnc56zvy2ppwq655za-libplacebo-6.292.1
Rebuild report (if merged into master) (click to expand)
149 total rebuild path(s)
149 package rebuild(s)
First fifty rebuilds by attrpath
MIDIVisualizer
adl
ani-cli
anime-downloader
anki
arcanPackages.all-wrapped
arcanPackages.arcan
arcanPackages.arcan-wrapped
arcanPackages.cat9-wrapped
arcanPackages.durden-wrapped
arcanPackages.ffmpeg
arcanPackages.pipeworld-wrapped
arcanPackages.prio-wrapped
arcanPackages.xarcan
audiobookshelf
celluloid
corrscope
cplay-ng
curseradio
deepin.dde-gsettings-schemas
deepin.deepin-movie-reborn
deepin.deepin-music
deepin.deepin-voice-note
dmlive
dra-cla
eaglemode
feishin
ff2mpv
ffcast
ffmpeg-full
ffmpeg_4-full
ffmpeg_5-full
ffmpeg_6-full
gonic
handbrake
haruna
hydrus
hypnotix
imagination
jellyfin
jellyfin-ffmpeg
jellyfin-media-player
jellyfin-mpv-shim
jftui
kaffeine
klipperscreen
kphotoalbum
libplacebo
libsForQt5.elisa
libsForQt5.kdenlive
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/kc2bqdndr3fq07qnc56zvy2ppwq655za-libplacebo-6.292.1 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A libplacebo https://github.com/r-ryantm/nixpkgs/archive/29b436348a8ca87d2221d8cd39b32557629c6996.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/kc2bqdndr3fq07qnc56zvy2ppwq655za-libplacebo-6.292.1
ls -la /nix/store/kc2bqdndr3fq07qnc56zvy2ppwq655za-libplacebo-6.292.1/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
4 packages marked as broken and skipped:
manim
obs-studio-plugins.obs-hyperion
python310Packages.moderngl-window
python311Packages.moderngl-window
91 packages failed to build:
MIDIVisualizer
arcanPackages.all-wrapped
arcanPackages.arcan
arcanPackages.arcan-wrapped
arcanPackages.cat9-wrapped
arcanPackages.durden-wrapped
arcanPackages.ffmpeg
arcanPackages.pipeworld-wrapped
arcanPackages.prio-wrapped
arcanPackages.xarcan
audiobookshelf
corrscope
deepin.deepin-music
deepin.deepin-voice-note
eaglemode
ffcast
ffmpeg_6-full
gonic
handbrake
haruna
imagination
jellyfin
jellyfin-ffmpeg
kaffeine
kphotoalbum
libsForQt5.elisa
libsForQt5.kdenlive
libsForQt5.phonon-backend-vlc
libsForQt5.soundkonverter
libvlc
liquidsoap
megaglest
minitube
obs-studio
obs-studio-plugins.advanced-scene-switcher
obs-studio-plugins.droidcam-obs
obs-studio-plugins.input-overlay
obs-studio-plugins.looking-glass-obs
obs-studio-plugins.obs-3d-effect
obs-studio-plugins.obs-backgroundremoval
obs-studio-plugins.obs-command-source
obs-studio-plugins.obs-gradient-source
obs-studio-plugins.obs-gstreamer
obs-studio-plugins.obs-livesplit-one
obs-studio-plugins.obs-move-transition
obs-studio-plugins.obs-multi-rtmp
obs-studio-plugins.obs-mute-filter
obs-studio-plugins.obs-ndi
obs-studio-plugins.obs-nvfbc
obs-studio-plugins.obs-pipewire-audio-capture
obs-studio-plugins.obs-rgb-levels-filter
obs-studio-plugins.obs-scale-to-sound
obs-studio-plugins.obs-shaderfilter
obs-studio-plugins.obs-source-clone
obs-studio-plugins.obs-source-record
obs-studio-plugins.obs-source-switcher
obs-studio-plugins.obs-teleport
obs-studio-plugins.obs-text-pthread
obs-studio-plugins.obs-transition-table
obs-studio-plugins.obs-tuna
obs-studio-plugins.obs-vaapi
obs-studio-plugins.obs-vertical-canvas
obs-studio-plugins.obs-vintage-filter
obs-studio-plugins.obs-vkcapture
obs-studio-plugins.obs-websocket
obs-studio-plugins.waveform
obs-studio-plugins.wlrobs
peek
printrun
pympress
python310Packages.aigpy
python310Packages.pydub
python310Packages.pyglet
python310Packages.python-vlc
python310Packages.pytmx
python311Packages.aigpy
python311Packages.pydub
python311Packages.pyglet
python311Packages.python-vlc
python311Packages.pytmx
reaper
restream
rofi-screenshot
strawberry
sunshine
tidal-dl
tone
video-trimmer
vlc
vokoscreen
wtwitch
43 packages built:
adl
ani-cli
anime-downloader
anki
celluloid
cplay-ng
curseradio
deepin.dde-gsettings-schemas
deepin.deepin-movie-reborn
dmlive
dra-cla
feishin
ff2mpv
ffmpeg_4-full
hydrus
hypnotix
jellyfin-media-player
jellyfin-mpv-shim
jftui
klipperscreen
libplacebo
libsForQt5.plasmatube
memento
mnemosyne
mpc-qt
mpv
mpv-unwrapped
mpvScripts.inhibit-gnome
mpvScripts.mpris
mpvScripts.thumbfast
mpvpaper
plex-media-player
plex-mpv-shim
python310Packages.mpv
python311Packages.mpv
qimgv
radioboat
somafm-cli
stremio
sublime-music
subtitleedit
tomato-c
ytfzf
Maintainer pings
cc @primeos @tadeokondrak for testing.
|
2025-04-01T06:37:18.954394
| 2023-08-26T15:39:00
|
1868148385
|
{
"authors": [
"fabaff",
"matthiasbeyer"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2103",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/251619"
}
|
gharchive/pull-request
|
python311Packages.griffe: 0.35.0 -> 0.35.1
Diff: https://github.com/mkdocstrings/griffe/compare/refs/tags/0.35.0...0.35.1
Changelog: https://github.com/mkdocstrings/griffe/blob/0.35.1/CHANGELOG.md
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 251619 run on x86_64-linux 1
9 packages built:
griffe (python310Packages.griffe)
griffe.dist (python310Packages.griffe.dist)
netbox
python310Packages.mkdocstrings-python
python310Packages.mkdocstrings-python.dist
python311Packages.griffe
python311Packages.griffe.dist
python311Packages.mkdocstrings-python
python311Packages.mkdocstrings-python.dist
Result of nixpkgs-review pr 251619 run on x86_64-linux 1
1 package marked as broken and skipped:
netbox_3_3
9 packages built:
griffe (python310Packages.griffe)
griffe.dist (python310Packages.griffe.dist)
netbox
python310Packages.mkdocstrings-python
python310Packages.mkdocstrings-python.dist
python311Packages.griffe
python311Packages.griffe.dist
python311Packages.mkdocstrings-python
python311Packages.mkdocstrings-python.dist
|
2025-04-01T06:37:18.964289
| 2023-10-08T07:36:04
|
1931688145
|
{
"authors": [
"fabaff"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2104",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/259722"
}
|
gharchive/pull-request
|
python311Packages.google-generativeai: 0.1.0 -> 0.2.1
Diff: https://github.com/google/generative-ai-python/compare/refs/tags/v0.1.0...v0.2.1
Changelog: https://github.com/google/generative-ai-python/releases/tag/v0.2.1
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 259722 run on x86_64-linux 1
5 packages built:
home-assistant-component-tests.google_generative_ai_conversation
python310Packages.google-generativeai
python310Packages.google-generativeai.dist
python311Packages.google-generativeai
python311Packages.google-generativeai.dist
|
2025-04-01T06:37:18.973796
| 2023-10-17T13:29:32
|
1947440750
|
{
"authors": [
"bobby285271"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2105",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/261644"
}
|
gharchive/pull-request
|
xfce.xfconf: 4.18.1 -> 4.18.2
https://gitlab.xfce.org/xfce/xfconf/-/compare/xfconf-4.18.1...xfconf-4.18.2
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
@ofborg test xfce
|
2025-04-01T06:37:18.982523
| 2023-10-18T13:12:01
|
1949721841
|
{
"authors": [
"DanielSidhion",
"nrabulinski"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2106",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/261828"
}
|
gharchive/pull-request
|
alpine-make-rootfs: init
Description of changes
alpine-make-rootfs is a tool a bit similar to the already-packaged alpine-make-vm-image. Instead of creating a full vm image, it only creates an Alpine Linux rootfs.
I've been using this already on my own projects, thought I'd package it to make it easy for others to use it as well.
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Since it's a new package and it doesn't need any overrides, wouldn't it be better to put in in by-name?
|
2025-04-01T06:37:18.993919
| 2023-12-10T21:36:51
|
2034543797
|
{
"authors": [
"nixos-discourse",
"quantenzitrone"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2107",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/273418"
}
|
gharchive/pull-request
|
i3-open-next-ws: init at 0.1.5
Description of changes
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[x] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Result of nixpkgs-review pr 273418 run on x86_64-linux 1
1 package built:
i3-open-next-ws
just changes to the meta attributes
This pull request has been mentioned on NixOS Discourse. There might be relevant details there:
https://discourse.nixos.org/t/prs-ready-for-review/3032/3078
|
2025-04-01T06:37:19.006008
| 2023-12-16T11:20:59
|
2044713093
|
{
"authors": [
"fabaff"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2108",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/274697"
}
|
gharchive/pull-request
|
restish: 0.19.0 -> 0.20.0
Diff: https://github.com/danielgtaylor/restish/compare/refs/tags/v0.19.0...v0.20.0
Changelog: https://github.com/danielgtaylor/restish/releases/tag/v0.20.0
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Result of nixpkgs-review pr 274697 run on x86_64-linux 1
1 package built:
restish
|
2025-04-01T06:37:19.019726
| 2024-01-08T21:45:29
|
2071274111
|
{
"authors": [
"fabaff"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2109",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/279692"
}
|
gharchive/pull-request
|
python311Packages.pymeteoclimatic: 0.0.6 -> 0.1.0
Diff: https://github.com/adrianmo/pymeteoclimatic/compare/0.0.6...0.1.0
Changelog: https://github.com/adrianmo/pymeteoclimatic/releases/tag/0.1.0
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
|
2025-04-01T06:37:19.029973
| 2024-01-16T21:11:34
|
2084942216
|
{
"authors": [
"prusnak"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2110",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/281398"
}
|
gharchive/pull-request
|
electrum: 4.4.6 -> 4.5.0
Description of changes
version update - https://github.com/spesmilo/electrum/blob/master/RELEASE-NOTES
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[x] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
@GrahamcOfBorg build electrum
|
2025-04-01T06:37:19.052119
| 2024-01-21T10:16:02
|
2092519043
|
{
"authors": [
"fabaff"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2111",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/282544"
}
|
gharchive/pull-request
|
python312Packages.overrides: 7.4.0 -> 7.6.0
Diff: https://github.com/mkorpela/overrides/compare/refs/tags/7.4.0...7.6.0
Changelog: https://github.com/mkorpela/overrides/releases/tag/7.6.0
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Result of nixpkgs-review pr 282544 run on x86_64-linux 1
8 packages marked as broken and skipped:
python311Packages.elegy
python311Packages.elegy.dist
python311Packages.jupyter-contrib-nbextensions
python311Packages.jupyter-contrib-nbextensions.dist
python311Packages.openllm
python311Packages.openllm.dist
python311Packages.treex
python311Packages.treex.dist
25 packages failed to build:
python311Packages.arviz
python311Packages.arviz.dist
python311Packages.augmax
python311Packages.augmax.dist
python311Packages.bambi
python311Packages.bambi.dist
python311Packages.jupyterlab-git
python311Packages.jupyterlab-git.dist
python311Packages.layoutparser
python311Packages.layoutparser.dist
python311Packages.nbdime
python311Packages.nbdime.dist
python311Packages.nikola
python311Packages.nikola.dist
python311Packages.oauthenticator
python311Packages.oauthenticator.dist
python311Packages.pdfplumber
python311Packages.pdfplumber.dist
python311Packages.pymc
python311Packages.pymc.dist
python312Packages.qiling
python312Packages.qiling.dist
tts
tts.dist
wolfram-notebook
130 packages built:
cantor (libsForQt5.cantor ,plasma5Packages.cantor)
ihaskell
jupyter
jupyter-all
labplot
manim
manim.dist
nbqa
nbqa.dist
python311Packages.ansible-kernel
python311Packages.ansible-kernel.dist
python311Packages.batchspawner
python311Packages.batchspawner.dist
python311Packages.bqplot
python311Packages.bqplot.dist
python311Packages.bqscales
python311Packages.bqscales.dist
python311Packages.dalle-mini
python311Packages.dalle-mini.dist
python311Packages.distrax
python311Packages.distrax.dist
python311Packages.dm-haiku
python311Packages.dm-haiku.dist
python311Packages.dockerspawner
python311Packages.dockerspawner.dist
python311Packages.einops
python311Packages.einops.dist
python311Packages.encodec
python311Packages.encodec.dist
python311Packages.experiment-utilities
python311Packages.experiment-utilities.dist
python311Packages.flax
python311Packages.flax.dist
python311Packages.ipytablewidgets
python311Packages.ipytablewidgets.dist
python311Packages.jupyter
python311Packages.jupyter-collaboration
python311Packages.jupyter-collaboration.dist
python311Packages.jupyter-contrib-core
python311Packages.jupyter-contrib-core.dist
python311Packages.jupyter-lsp
python311Packages.jupyter-lsp.dist
python311Packages.jupyter-nbextensions-configurator
python311Packages.jupyter-nbextensions-configurator.dist
python311Packages.jupyter-server
python311Packages.jupyter-server-fileid
python311Packages.jupyter-server-fileid.dist
python311Packages.jupyter-server-mathjax
python311Packages.jupyter-server-mathjax.dist
python311Packages.jupyter-server.dist
python311Packages.jupyter.dist
python311Packages.jupyterhub
python311Packages.jupyterhub-ldapauthenticator
python311Packages.jupyterhub-ldapauthenticator.dist
python311Packages.jupyterhub-systemdspawner
python311Packages.jupyterhub-systemdspawner.dist
python311Packages.jupyterhub-tmpauthenticator
python311Packages.jupyterhub-tmpauthenticator.dist
python311Packages.jupyterhub.dist
python311Packages.jupyterlab
python311Packages.jupyterlab-lsp
python311Packages.jupyterlab-lsp.dist
python311Packages.jupyterlab-server
python311Packages.jupyterlab-server.dist
python311Packages.jupyterlab.dist
python311Packages.jupytext
python311Packages.jupytext.dist
python311Packages.k-diffusion
python311Packages.k-diffusion.dist
python311Packages.mkdocs-jupyter
python311Packages.mkdocs-jupyter.dist
python311Packages.nbclassic
python311Packages.nbclassic.dist
python311Packages.nbdev
python311Packages.nbdev.dist
python311Packages.nix-kernel
python311Packages.nix-kernel.dist
python311Packages.notebook
python311Packages.notebook-shim
python311Packages.notebook-shim.dist
python311Packages.notebook.dist
python311Packages.notedown
python311Packages.notedown.dist
python311Packages.overrides
python311Packages.overrides.dist
python311Packages.phik
python311Packages.phik.dist
python311Packages.pyarr
python311Packages.pyarr.dist
python311Packages.pydeck
python311Packages.pydeck.dist
python311Packages.pymoo
python311Packages.pymoo.dist
python311Packages.python-fx
python311Packages.python-fx.dist
python311Packages.qgrid
python311Packages.qgrid.dist
python311Packages.qiling
python311Packages.qiling.dist
python311Packages.rlax
python311Packages.rlax.dist
python311Packages.rotary-embedding-torch
python311Packages.rotary-embedding-torch.dist
streamlit (python311Packages.streamlit)
streamlit.dist (python311Packages.streamlit.dist)
python311Packages.tsfresh
python311Packages.tsfresh.dist
python311Packages.vector
python311Packages.vector.dist
python311Packages.vega
python311Packages.vega.dist
python311Packages.vqgan-jax
python311Packages.vqgan-jax.dist
python311Packages.xarray-einstats
python311Packages.xarray-einstats.dist
python312Packages.nbdev
python312Packages.nbdev.dist
python312Packages.overrides
python312Packages.overrides.dist
python312Packages.pyarr
python312Packages.pyarr.dist
python312Packages.python-fx
python312Packages.python-fx.dist
quarto
rstudio
rstudio-server
rstudioServerWrapper
rstudioWrapper
sage
sageWithDoc
|
2025-04-01T06:37:19.063680
| 2024-02-20T18:25:15
|
2145012952
|
{
"authors": [
"klinger",
"ncfavier"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2112",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/290231"
}
|
gharchive/pull-request
|
doc: added nvidiaLegacy driver version 470 to available options in nixos manual
It is possible to install the nvidiaLegacy470 driver for the slightly outdated GPUs, but the documentation only has the hints how to install the drivers for the even older GPUs.
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
I don't understand this PR: were you actually able to enable the legacy nvidia drivers using nvidiaLegacy470? From what I understand, this option should cause an error to be thrown since https://github.com/NixOS/nixpkgs/pull/99323 (2020), and even that was removed in https://github.com/NixOS/nixpkgs/pull/244060 so now it does nothing.
I'm proposing to update the docs in https://github.com/NixOS/nixpkgs/pull/298956
|
2025-04-01T06:37:19.073665
| 2024-03-06T13:11:23
|
2171481135
|
{
"authors": [
"toonn"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2113",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/293769"
}
|
gharchive/pull-request
|
wire-desktop: mac 3.32.4589 -> 3.35.4861, linux 3.32.3079 -> 3.35.3348
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
This is the second time I've updated this version bump. I'll leave it for a bit longer but if no one's interested in reviewing I'll go ahead and self-merge this one.
|
2025-04-01T06:37:19.078870
| 2017-10-13T04:14:33
|
265165085
|
{
"authors": [
"adisbladis"
],
"license": "MIT",
"license_source": "github-api",
"license_type": "permissive",
"provenance": "gharchive-dolma-0000.json.gz:2114",
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/30380"
}
|
gharchive/pull-request
|
desktop-managers: Fix unsupported attribute 'xcfg'
Motivation for this change
After https://github.com/NixOS/nixpkgs/pull/30286 a nixos-rebuild results in:
error: Module `/etc/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/default.nix' has an unsupported attribute `xcfg'. This is caused by assignments to the top-level attributes `config' or `options'.
(use ‘--show-trace’ to show detailed location information)
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option build-use-sandbox in nix.conf on non-NixOS)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[x] Fits CONTRIBUTING.md.
Closing because of https://github.com/NixOS/nixpkgs/pull/30385
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.